Back-end authentication
  • 03 Jan 2025
  • 1 Minute à lire
  • Sombre
    Lumière
  • PDF

Back-end authentication

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

Back-end authentication describes the process of verifying user credentials with another system. It is used primarily to:

  • Enable automatic management features, such as Dynamic User Registration (DUR) and authenticator self-assignment.
  • Verify static passwords for users who do not have an authenticator and for Virtual Mobile Authenticator.
  • Retrieve RADIUS attributes from a RADIUS server.
  • Replace passwords to allow the user to log in with just a one-time password (OTP) in an environment where the Windows password is required (e.g. Outlook Web Access).

Cet article vous a-t-il été utile ?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle