Showing 241 - 250 of 255 results
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/classic-authentication-strategy/internal-authenticationInternal User Sources
-
https://docs.inductiveautomation.com/docs/7.9/security/user-sources/verifying-a-user-sourceYou can verify that a user exists in a given User Source, if the password is correct, what roles a user has, and any other information added about the user.
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/identity-provider-authentication-strategy/user-grants
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/classic-authentication-strategy/fallback-cache-authenticationThis User Source was developed specifically for a system that is using Local Vision Client Fallback, and allows you to cache the login credentials from a remote user source. This means your users can still log in with their normal username/password on a Local Vision Client Fallback project, even when
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/identity-provider-authentication-strategy/troubleshooting-identity-providersThis Troubleshooting section has a compilation of examples to help you diagnose and troubleshoot issues with configuring IdPs.
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/identity-provider-authentication-strategy/configuring-identity-providersRegistering the Ignition Gateway
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/classic-authentication-strategy/managing-users-and-rolesUsers and Roles
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/identity-provider-authentication-strategy/test-login-and-logoutOn the Identity Providers screen you can test a username and password combination against an Identity Provider (IdP).
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/identity-provider-authentication-strategy/configuring-identity-providers/saml-exampleThis section provides an example of how to connect an Identity Provider that is using the SAML protocol. This example uses the Okta IdP service. Your IdP vendor may differ and the specific links will differ.
-
https://docs.inductiveautomation.com/docs/8.1/platform/security/identity-provider-authentication-strategy/configuring-identity-providers/user-attribute-mappingThe User Attribute Mapping page allows you to map information in the Identity Providers (IdP) response document to easily understandable properties. These properties are then made available as Session Properties in the Perspective Session. To work, this requires that the Gateway already has a valid IdP
Were these results helpful?