Authentication data is formatted from the authentication module and its parameters and values. You can specify initial data for the parameters and their values. By default, the initial data is preset for each authentication process.
Syntax for authentication data:
Module=<authentication module>;<property1>=<value1>;<property2>=<value2>,…
Example:
Module=DialogUser;User=<user name>;Password=<password>
To set initial data for authentication modules
-
In the Designer, select the Base data > Security settings > Authentication modules category.
-
Select the authentication module and enter the data in Initial data.
Syntax:
property1=value1;property2=value2
Example:
User=<user name>;Password=<password>
Authentication module | Display name | Parameters and meaning |
---|---|---|
DialogUser |
System users |
User: User name Password: The user's password |
ADSAccount |
Active Directory user account |
No parameters required |
DynamicADSAccount |
Active Directory user account (dynamic) |
Product: Usage. The system user is determined through the use case configuration data. |
DynamicManualADS |
Active Directory user account (manual input) |
Product: Usage. The system user is determined through the use case configuration data. User: User name. The user‘s identity is determined from a predefined list of permitted Active Directory domains. In the TargetSystem | ADS | AuthenticationDomains configuration parameter, enter the permitted Active Directory domains. Password: The user's password. |
RoleBasedADSAccount |
Active Directory user account (role-based) |
No parameters required |
RoleBasedManualADS |
Active Directory user account (manual input/role-based) |
User: User name. The user‘s identity is determined from a predefined list of permitted Active Directory domains. In the TargetSystem | ADS | AuthenticationDomains configuration parameter, enter the permitted Active Directory domains. Password: The user's password |
Employee |
Employee |
User: Employee's central user account. Password: The user's password |
DynamicPerson |
Employee (dynamic) |
Product: Usage. The system user is determined through the use case configuration data. User: User name. Password: The user's password |
RoleBasedPerson |
Employee (role-based) |
User: User name. Password: The user's password. |
HTTPHeader |
HTTP header |
Header: The HTTP header to use. KeyColumn: Comma delimited list of key columns in the Person table to be searched for user names. Default: CentralAccount, PersonnelNumber |
RoleBasedHTTPHeader |
HTTP header (role-based) |
Header: The HTTP header to use. KeyColumn: Comma delimited list of key columns in the Person table to be searched for user names. Default: CentralAccount, PersonnelNumber |
DynamicLdap |
LDAP user account (dynamic) |
User: User name. Default: CN, DistinguishedName, UserID, UIDLDAP Password: The user's password |
RoleBasedLdap
|
LDAP user account (role-based)
|
User: User name. Default: CN, DistinguishedName, UserID, UIDLDAP Password: The user's password |
RoleBasedGeneric |
Generic single sign-on (role-based) |
SearchTable: Table in which to search for the user name of the logged in user. This table must contain a FK named UID_Person that points to the Person table. SearchColumn: Column from the SearchTable in which to search for the user name of the logged-in user. DisabledBy: Pipe (|) delimited list of Boolean columns which block a user account from logging in. EnabledBy: Pipe (|) delimited list of Boolean columns which release a user account for logging in. |
OAuth |
OAuth 2.0/OpenID Connect |
Dependent on the authentication method of the secure token service. |
OAuthRoleBased |
OAuth 2.0/OpenID Connect (role-based) |
Dependent on the authentication method of the secure token service. |
DialogUserAccountBased |
Account based system user |
No parameters required |
QERAccount |
User account |
No parameters required |
RoleBasedQERAccount |
User account (role-based) |
No parameters required |
RoleBasedManualQERAccount |
User account (manual input/role-based) |
User: User name. The user‘s identity is determined from a predefined list of permitted Active Directory domains. In the TargetSystem | ADS | AuthenticationDomains configuration parameter, enter the permitted Active Directory domains. Password: The user's password |
PasswordReset |
Password reset |
No parameters required |
RoleBasedPasswordReset |
Password reset (role-based) |
No parameters required |
DecentralizedId
|
Decentralized identity
|
Email: Default email address of the employee (Person.DefaultEmailAddress) or contact email address of the employee (Person.ContactEmail) Identifier: Decentralized identity of the employee (Person.DecentralizedIdentifier). |
RoleBasedDecentralizedId
|
Decentralized Identity (role-based)
|
Email: Default email address of the employee (Person.DefaultEmailAddress) or contact email address of the employee (Person.ContactEmail) Identifier: Decentralized identity of the employee (Person.DecentralizedIdentifier). |
Token
|
|
Internal authentication module in the application server for authentication using OAuth 2.0/OpenID Connect access tokens. For more information, see Setting up OAuth 2.0/OpenID Connect authentication for accessing the application server's REST API. URL: URL of the application server. ClientId: ID of the application on the identity provider. ClientSecret: Secret value for authentication at the token endpoint. TokenEndpoint: Uniform Resource Identifier (URL) of the token endpoint of the authorization server for returning the access token to the client for logging in. |