Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

A User must have a valid IMMS account and must authenticate with the system to access IMMS functionality and the data maintained in the system. Depending on the operational requirements and security policy for the particular Instance, one or multiple authentication modes may be available to Users. 

This article will cover the following topics and features:

Table of Contents

Authentication Providers

...