A user must have a valid IMMS account and must authenticate with the system to access IMMS functionality and the data maintained in the system. Depending on the operational requirements and security policy for the particular IMMS instances, one or multiple authentication modes may be available to its users.
...
...
Table of Contents |
---|
Authentication Providers
IMMS supports multiple methods for authenticating its users:
...