Authentication configuration - j5 - 28.0 - Installation & Upgrade - Hexagon

j5 Installation and Upgrade

Language
English
Product
j5
Search by Category
Installation & Upgrade
j5 Version
2019

The authentication method controls the way in which users can sign into j5. Users are authenticated by their username and password combination which is managed by the configured authentication mechanism/s.

  • A user's j5 authorization (j5 application access rights and usage privileges) is not controlled by the authentication method, but by the user rights groups and workflow roles.

  • The following authentication mechanisms can be used to sign into j5 but might be limited by the tools you use to access j5 (for example, Power BI).

The following authentication mechanisms are available:

j5 Mobile does not support SSO (the Kerberos authenticator). If you are using the Kerberos authenticator for the j5 Web Client, another authentication method needs to be configured for j5 Mobile (refer to Add and delete authenticators for more information).