The NoAuthenticator protocol allows access to the j5 system without authentication. This is used in rare cases when access control is not needed.
Set the Login User field to the username that should be used for all who will access j5.
The NoAuthenticator protocol allows access to the j5 system without authentication. This is used in rare cases when access control is not needed.
Set the Login User field to the username that should be used for all who will access j5.