Showing 2131 - 2140 of 2999 results
-
https://docs.inductiveautomation.com/docs/8.1/platform/database-connections/connecting-to-databases/jdbc-drivers-and-translators/jdbc-driver-and-database-translator-settingsThis page details various JDBC driver and translator settings.
-
https://docs.inductiveautomation.com/docs/7.9/enterprise-administration/agent-tasks/send-projectAgent Tasks have the ability to send projects and project resources from a Controller to an Agent.
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/identity-provider-authentication-strategy/configuring-identity-providers/openid-connect-1-exampleThis section provides an example of how to connect an Identity Provider that is using the OpenID Connect 1.0 protocol. This example uses the Okta IdP service. Your IdP vendor may differ and the specific links will differ.
-
https://docs.inductiveautomation.com/docs/8.1/ignition-modules/vision/security-in-vision/component-and-window-securityRole-based security inside of Vision works on multiple levels: component, group, container, and window levels. Each of these levels also have special categories of security that help with tuning security to various design considerations.
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/identity-provider-authentication-strategy/test-login-and-logoutOn the Identity Providers screen you can test a username and password combination against an Identity Provider (IdP).
-
https://docs.inductiveautomation.com/docs/8.1/getting-started/installing-and-upgrading/ignition-8-upgrade-guide/79to81-upgrade-guideIgnition 8.1 is a major update across virtually all subsystems and modules. Inductive Automation strives to maintain its commitment to backwards compatibility and a straight-forward upgrade process. However, given the vast scope of changes in 8.1, there are inevitably special considerations that need
-
https://docs.inductiveautomation.com/docs/7.9/clients/about-mobile-clients/mobile-client-settingsCommon Mobile Settings
-
https://docs.inductiveautomation.com/docs/7.9/tags/understanding-tagsWhere are Tags Configured?
-
https://docs.inductiveautomation.com/docs/8.1/appendix/deprecated-pages/tag-editor-800-8116/tag-security-propertiesTag security is often the best way to configure security for data access. By defining security on a tag, you affect the tag across wherever it is used, as opposed to configuring component security on each component that displays or controls that tag.
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/classic-authentication-strategy/verify-a-user-on-a-user-sourceYou can verify that a user exists in a given User Source, if the password is correct, what roles a user has, and any other information added about the user.

Were these results helpful?