Securing access through user authentication
- Each user must log on with a valid user name and password. During installation, the administrator selected the user authentication method (for example, local, TACACS+, RADIUS, Active Directory, or New in 20.02.01 SAML 2.0).
- The web-based client-server session is secured using HTTPS.
- Each user is assigned one or more roles. The role specifies the rights granted to the user and where those rights can be used (that is, which realms, if TrueSight Network Automation has more than one realm).
- Each user must have the appropriate login system rights to log on to the application server through GUI, Web Services, or SSH Proxy. The login rights are assigned through roles.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*