A User must have a valid IMMS account and must authenticate with the system to access IMMS functionality and the data maintained in the system. Depending on the operational requirements and security policy for the particular Instance, one or multiple authentication modes may be available to Users.
This article will cover the following topics and features:
Table of Contents |
---|
Authentication Providers
...