Showing 1511 - 1520 of 1537 results
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/classic-authentication-strategyThe Classic Authentication strategy authenticates users against a User Source. Both the Designer and Vision Client can authenticate users with this strategy.
-
https://docs.inductiveautomation.com/docs/7.9/security/managing-users-and-rolesUsers and Roles
-
https://docs.inductiveautomation.com/docs/8.1/ignition-modules/vision/security-in-visionSecurity in Vision is managed through one of two authentication strategies, either the Classic Authentication strategy or Identity Providers (IdP) strategy. Classic Authentication Strategy involves a concept known as a User Source, which is a configuration that contains multiple roles and users. IdPs
-
https://docs.inductiveautomation.com/docs/8.1/ignition-modules/perspective/security-in-perspectiveSecurity in Perspective is managed through Identity Providers (IdP). IdPs offers a way for users to log in to Ignition using credentials stored outside of Ignition. This level of security is set up through the Gateway. Setting up Security is covered in the Security section of the User Manual.
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/identity-provider-authentication-strategyAn Identity Provider (IdP) offers a way for users to log in to Ignition using credentials stored outside of Ignition. An IdP creates, maintains, and manages identity (login) information while providing authentication services to Ignition. This provides a secure login that allows Ignition to use SSL and
-
https://docs.inductiveautomation.com/docs/8.1/platform/tags/tag-properties/tag-security-properties
-
https://docs.inductiveautomation.com/docs/8.1/ignition-modules/opc-ua/opc-ua-securityOn the OPC UA security page you can manage OPC UA certificates for the client and server. Trusted certificates can be imported and quarantined certificates can be marked as trusted.
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/classic-authentication-strategy/database-authenticationDatabase User Source
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/classic-authentication-strategy/internal-authenticationInternal User Sources
-
https://docs.inductiveautomation.com/docs/7.9/security/user-sources/verifying-a-user-sourceYou can verify that a user exists in a given User Source, if the password is correct, what roles a user has, and any other information added about the user.

Were these results helpful?