Symphony Supported Authentication Tools
This applies to: Visual Data Discovery
Symphony supports several approaches to authenticating users. Your organization must choose the best approach given your existing constraints and objectives.
Symphony provides basic login access to the Symphony application. See Authorize Symphony Access.
-
Trusted Access can be used to allow for machine-to-machine authorization of Symphony resources when embedded in your application. It allows users to log in once to the parent application and yet have their security information propagated to Symphony, creating a seamless and secure user experience. See Trusted Access.
Note: insightsoftware recommends using Trusted Access for all embed-related workflows.
Symphony system administrators can enable or disable Symphony's authentication services as required. The available services are listed on the Security Services tab:
Log in as a system admin.
-
Select Tools > Security from the main menu.
The Security page appears. It consists of several sections: Security Services, . The Security Services tab is selected. Other tabs shown are accessible only when the corresponding service is enabled on the Security Services tab.
Enabling or disabling any of these security services requires a restart of the Symphony service. Basically, any time you switch a security feature, the Symphony service needs to be restarted before the change takes effect. The following switch status may appear for each of the authentication services: Started, Stopped, Will start or stop on next restart.
When working with security authentication services, bear in mind that you cannot use them all at the same time. If you switch a particular security service on, others will become disabled. If you want to use a security service that is disabled, you must switch the running services off and then start the service you want. The following table describes the compatibility of the security services.
Security Service | Can Be Used With |
---|---|
SAML SSO |
Trusted Access |
Trusted Access |
Kerberos, x.509 |
Comments
0 comments
Please sign in to leave a comment.