Authentication configuration - j5 - 28.0 - Installation & Upgrade - Hexagon PPM

j5 Installation and Upgrade

English (United States)
Search by Category
Installation & Upgrade
j5 Version

The authentication resources control the ways in which users can sign into j5. Users are authenticated against a username and password combination which is managed by the configured authentication protocol.

Authorization (application access rights and usage privileges) is not controlled by the authentication resources, but by the Group Rights and Workflow Roles.

The following authentication mechanisms are available:

  • j5 Users Database Authentication

  • Active Directory Authentication

    • LDAP Authenticator

    • Kerberos Authenticator

  • Recommended configuration for j5 AD Synchronization

  • NativeADAuthenticator

  • OAuth 2.0 / OpenID Connect Authentication

    • Okta

    • Azure AD

    • Other

  • No Authentication

These authentication mechanisms can be used to sign into j5, but might be limited by the tools (for example, Power BI) you use to access j5.