Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

A user must have a valid IMMS account and must authenticate with the system to access IMMS functionality and the data maintained in the system. Depending on the operational requirements and security policy for the particular IMMS instances, one or multiple authentication modes may be available to its users. 

...


...

Table of Contents

Authentication Providers

IMMS supports multiple methods for authenticating its users:

...