Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Locator indexes data from multiple sources. The security model in many sources are Active Directory based . Other sources can be based on other authentication systems. To be able to search data from all configured sources, you will be promoted to enter credentials for all configured sources. When entering your credentials, you will be authenticated and authorized in these systems, meaning Locator will identify if you have access to and who you are in these sources. Based on this information only results you have minimum of read access to will be returned.

For the primary authentication system During login you will be authenticated and authorized during loginfor the primary authentication system. This is most commonly Active Directory. For the secondary authentication system systems, you will be prompted to enter your credentials to after you’ve been logged in. To manage your secondary authentication system credentials, go to Search Settings in the Locator UI, go to Search Settings. In the section Source credentials, all secondary authentication systems will be listed.

...