Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents

...

The numbered steps below correspond to the red numbers in the graphic above. Authentication takes place in step 3 and 4 andauthorizationin step 6 and 7

  1. The user opens a browser and enters the URL of the Locator search page in the address box

  2. The Gateway routes the incoming request to the Search UI

  3. The user is prompted for their credentials to authenticate.

  4. The user is authenticated by the Authority service that is synced with one or more external user database, for instance Microsoft Active Directory.

  5. The user enters a query in the search box of the Search UI

  6. The query is expanded with user’s SIDs before it is passed to the Index.

  7. The search result is cleaned for any document to which the user does not have access. This is referred to as security trimming.

  8. The search result is further modified based on rules in the Rule Engine

  9. The Search UI displays the search result with a URI to access the document at the data source

...

Below the table, there is an example that explains how to use the table to determine which authentication method to use.

Connector

Azure AD

Azure AD with AD sync

Active Directory

Active Directory with Azure AD connector

1

Recommended

2nd choice

3rd choice

Option of last resort

2

AzureAD

(tick)

(tick)

(error)

(tick)

3

Acos Websack [DBC]

(tick)

(tick)

(tick)

(tick)

4

Confluence

🟢

🟢

🟢

🟢

5

CorePublish

🟢

🟢

🟢

🟢

6

Dropbox Business

(tick)

(tick)

(tick)

(tick)

7

eDOCS DM [DBC]

(tick)

(tick)

(tick)

(tick)

8

EloECM

🟢

🟢

🟢

🟢

9

Enterprise Vault

(error)

(tick)

(tick)

(tick)

10

ePhorte

(error)

(tick)

(tick)

(tick)

11

Exchange -

On Premises connection

(tick)

(tick)

(tick)

(tick)

12

Exchange -
Online (Single sign-on to hosted Exchange via ADFS) connection

(tick)

(tick)

(tick)

(tick)

13

Exchange - Online (Logon to hosted Exchange via cloud credentials)

(tick)

(tick)

(tick)

(tick)

14

FileServer

(error)

(tick)

(tick)

(tick)

15

Google Workspace

(tick)

(tick)

(tick)

(tick)

16

Hubspot

(tick)

(tick)

(tick)

(tick)

17

iManage Work / iManage Cloud

(tick)

(tick)

(error)

(error)

18

Jira

🟢

🟢

🟢

🟢

18
19

Maconomy Cloud

(tick)

(tick)

(tick)

(tick)

19
20

Mailstore

(tick)

(tick)

(tick)

(tick)

20
21

MediaWiki

(tick)

(tick)

(tick)

(tick)

21
22

Microsoft Dynamics CRM

(tick)

(tick)

(tick)

(tick)

22
23

NetDocuments

(tick)

(tick)

(tick)

(tick)

23
24

P360Online

(tick)

(error)

(tick)

(tick)

(tick)

24
25

Salesforce

(error)

(error)

(tick)

(tick)

25
26

Sharepoint

(tick)

(tick)

(tick)

(tick)

26
27

Simployer aka Infotjenester

(error)

(tick)

(tick)

(tick)

27
28

Slack

(error)

(error)

(tick)

(tick)

28
29

SuperOffice CRM

29

(tick)

(tick)

(tick)

(tick)

30

SuperOffice CRM Online

(tick)

(tick)

(tick)

(tick)

30
31

Teams

(tick)

(tick)

(error)

(tick)

31
32

Web

(tick)

(tick)

(tick)

(tick)

32
33

Worksite [DBC]

(tick)

(tick)

(tick)

(tick)

Authentication Method Selection Example

The authentication method to use is found by identifying the left most column with only green icons for the set of connectors that one is to use.

Connector

Azure AD

Azure AD with AD sync

Active Directory

Active Directory with Azure AD connector

1

Recommended

2nd choice

3rd choice

Option of last resort

2

Exchange - Online (Logon to hosted Exchange via cloud credentials)

(tick)

(tick)

(tick)

(tick)

3

FileServer

(error)

(tick)

(tick)

(tick)

4

Sharepoint

(tick)

(tick)

(tick)

(tick)

In the example above we have a customer that is to install the following 3 connectors: the FileServer, Exchange Online and SharePoint. As we can see, Azure AD with AD sync is the left most column with only green markings. And that would then be the configuration one should go for.