General Settings → Authentication
In the Authentication tab, you configure SBM authentication settings. You can configure authentication settings in utility mode after your database has been initialized.
If your installation uses multiple Web servers with different authentication settings for each server, select the Override authentication settings for this server check box and configure the authentication settings for your local server. Clear the check box if all servers will use the same authentication settings.
To begin configuring SBM authentication, select the method SBM will use to manage user sessions.
SSO enables users to provide their login credentials once, receive a security token in return, and then use this token again to access other SSO-enabled tools without logging in again. Because SSO offers a single point of access to SBM that enhances the end-user experience, consider selecting this option to manage SBM user sessions.
Optimizes the performance of log in and log out features and is recommended for browsers that support cookies.
After you determine how SBM will manage user sessions, select which option to use to obtain browser user credentials.
Displays a login form in the Web browser to gather user credentials.
Credentials of the user logged in to the workstation are used to log in automatically.
Note the following important information about using Single Sign-On with Windows Authentication:
Browser user credentials are collected and authenticated by a SAML2 identity provider or another identity management system. You will configure additional settings on the External Identity Provider tab that appears.
When you select either Single Sign-On or Third Party Authentication System, browser users are validated externally and logged in automatically without a login form. In the following section, you will determine which authentication source to use for validating Web service and API calls in this scenario.
Finally, select the authentication source that SBM will validate credentials against. If you selected Windows Authentication or Third Party Authentication System to collect identities, use this option to designate how Web service calls and connections from the SBM API are authenticated.
Uses SBM login IDs and internal SBM passwords to authenticate users.
Validates users against LDAP using SBM Application Engine.
Validates users against LDAP using SBM Application Engine first, and then against the internal SBM database if the user is not found in LDAP.
Validates users against LDAP using SSO.
Validates users against LDAP using SSO first, and then against the internal SBM database if the user is not found in LDAP.
Uses the Windows security system for authentication. User login IDs and passwords are authenticated against your Windows domain.
The domain that is used for validation differs as follows depending on the session management option that you select:
Depending on the authentication source and session management options that you select, you can optionally designate a User session time-out period.
This setting forces users to re-authenticate if they have not actively used the system for a specified number of minutes. Enter a positive integer to have SBM automatically log out users who are inactive for the specified number of minutes. This feature does not apply when browser user identities are collected via Windows Authentication.
When this setting is enabled, the Web client polls the server once a minute to determine if the configured timeout has been exceeded. If no activity has occurred in the browser and the configured timeout has been exceeded, the client disconnects the session and returns a message that indicates that the session has timed out. If the timeout is exceeded and the user attempts to make a change in the browser before the next polling period after the timeout period has lapsed, then the session is immediately disconnected and the user is prompted to log in again.
If the connection to the server is lost or the server cannot be reached, the existing session is automatically disconnected after the first unsuccessful poll between the client and the server. Note that any data that is entered in a transition form that is not completed when the session timeout occurs is lost and will need to be re-entered in the transition form again when the user logs back in.
Copyright © 2007–2016 Serena Software, Inc. All rights reserved.