Showing 2441 - 2450 of 3777 results
-
https://docs.inductiveautomation.com/docs/8.1/appendix/deprecated-pages/tag-editor-800-8116/tag-security-propertiesTag security is often the best way to configure security for data access. By defining security on a tag, you affect the tag across wherever it is used, as opposed to configuring component security on each component that displays or controls that tag.
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/identity-provider-authentication-strategy/configuring-identity-providers/user-attribute-mappingThe User Attribute Mapping page allows you to map information in the Identity Providers (IdP) response document to easily understandable properties. These properties are then made available as Session Properties in the Perspective Session. To work, this requires that the Gateway already has a valid IdP
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/classic-authentication-strategy/managing-users-and-rolesUsers and Roles
-
https://docs.inductiveautomation.com/docs/8.1/ignition-modules/alarm-notification/notification-profile-types/voice-notification-profile/notification-security-pinYou can force an operator to enter a personal identification number (PIN) in order to hear a Voice alarm notification message. Itâs a good idea to validate that the person who is receiving the voice alarm is the correct person by requiring a PIN.
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/identity-provider-authentication-strategy/test-login-and-logoutOn the Identity Providers screen you can test a username and password combination against an Identity Provider (IdP).
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/identity-provider-authentication-strategy/configuring-identity-providers/openid-connect-1-exampleThis section provides an example of how to connect an Identity Provider that is using the OpenID Connect 1.0 protocol. This example uses the Okta IdP service. Your IdP vendor may differ and the specific links will differ.
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/classic-authentication-strategy/verify-a-user-on-a-user-sourceYou can verify that a user exists in a given User Source, if the password is correct, what roles a user has, and any other information added about the user.
-
https://docs.inductiveautomation.com/docs/8.1/other-editions/ignition-cloud-edition/image-access-instructions-azure/cloud-edition-azure-networking-and-securityThis page details various networking and security settings you may need to configure for your Cloud Edition virtual machine.
-
https://docs.inductiveautomation.com/docs/8.1/other-editions/ignition-cloud-edition/ami-access-instructions-aws/cloud-edition-aws-networking-and-securityThis page details various networking and security settings you may need to configure for your Cloud Edition EC2 instance.
-
https://docs.inductiveautomation.com/docs/8.1/appendix/expression-functions/type-casting/toStrIdentical to the toString expression function.

Were these results helpful?