Showing 241 - 250 of 295 results
-
https://docs.inductiveautomation.com/docs/8.1/appendix/scripting-functions/system-util/system-util-retargetThis function allows you to programmatically 'retarget' a Vision Client to a different project and/or different Gateway.
-
https://docs.inductiveautomation.com/docs/8.1/appendix/scripting-functions/system-securitySecurity Functions
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/oauth-2-clients
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/classic-authentication-strategyThe Classic Authentication strategy authenticates users against a User Source. Both the Designer and Vision Client can authenticate users with this strategy.
-
https://docs.inductiveautomation.com/docs/7.9/security/managing-users-and-rolesUsers and Roles
-
https://docs.inductiveautomation.com/docs/8.1/appendix/scripting-functions/system-tag/system-tag-queryTagCalculationsQueries various calculations (aggregations) for a set of tags over a specified range.
-
https://docs.inductiveautomation.com/docs/7.9/appendix/scripting-functions/system-net/system-net-sendEmailSends an email through the given SMTP server.
-
https://docs.inductiveautomation.com/docs/8.1/appendix/scripting-functions/system-net/system-net-sendEmailSends an email through the given SMTP server.
-
https://docs.inductiveautomation.com/docs/8.1/ignition-modules/vision/security-in-visionSecurity in Vision is managed through one of two authentication strategies, either the Classic Authentication strategy or Identity Providers (IdP) strategy. Classic Authentication Strategy involves a concept known as a User Source, which is a configuration that contains multiple roles and users. IdPs
-
https://docs.inductiveautomation.com/docs/8.1/ignition-modules/perspective/security-in-perspectiveSecurity in Perspective is managed through Identity Providers (IdP). IdPs offers a way for users to log in to Ignition using credentials stored outside of Ignition. This level of security is set up through the Gateway. Setting up Security is covered in the Security section of the User Manual.

Were these results helpful?