[Prev][Next][Report an Error]

Configuring System Authentication

You can use the User Management page to configure the authentication methods that the device uses to verify that a user can gain access. For each login attempt, the device tries the authentication methods in order, starting with the first one, until the password matches.

If you do not configure system authentication, users are verified based on their configured local passwords.

To configure system authentication:

  1. In the J-Web interface, select Configure>System Properties>User Management.
  2. Click Edit. The Edit User Management dialog box appears.
  3. Select the Authentication Method and Order tab.
  4. Under Available Methods, select the authentication method the device should use to authenticate users, and use the arrow button to move the item to the Selected Methods list. Available methods include:

    If you want to use multiple methods to authenticate users, repeat this step to add the additional methods to the Selected Methods list.

  5. Under Selected Methods, use the up and down arrows to specify the order in which the device should execute the authentication methods.
  6. Click OK.

[Prev][Next][Report an Error]