Windows Authentication
When enabled, Cobra uses Windows authentication for the selected data source during the initial login to the application. This authentication method is also applied when switching to a different data source during re-login.
With Windows authentication, users' access to Cobra is based on their Windows credentials rather than a separate set of Cobra credentials.
To set up Windows authentication, use the Authentication Options dialog box in the EPM Security Administrator.
Attention: For more information, see the
Turn Windows Authentication On or Off topic and the EPM Security Administrator Help System.
The table below outlines three options for using Windows Authentication to verify credentials when users log into Cobra.
Authentication Mode | Description | Deployment Type |
---|---|---|
Windows User Name authentication | This mode uses the authenticated Windows User Name and validates it against the Cobra user list. The Windows User Name is used as the Cobra login ID. The Windows Domain is not validated. | Standalone, Client/Server, N-tier |
Windows Domain and User Name authentication | This mode uses the authenticated Windows Domain and User Name and validates both against the Cobra user list. Each Cobra user must have a Domain name assigned to his or her user record. The Windows User Name is used as the Cobra login ID. | Standalone, Client/Server, N-tier |
Windows Domain and User Name authentication plus role authentication with communication security | This mode is the same as Windows Domain and User Name authentication but also supports further restricting access to Cobra through the use of a Windows Security Group (role), and supports security on communication between the client and server.
This mode requires additional configuration through the communication configuration files used by n-tier deployments. |
N-tier |
- Related Topics:
- Windows Domain and User Name Authentication Plus Role Authentication
One of your options for authenticating a user's credentials at login is Windows Domain and User Name authentication, plus role authentication and communication security. This authentication is available only for n-tier deployments. - Configure Windows Authentication in an N-Tier Deployment
Follow these steps to set up Windows authentication in an n-tier deployment. - Configuring Windows Authentication Using the Configuration Files
You can configure Windows authentication by adding netTcpBinding or wsHttpBinding to the configuration files.
Parent Topic: Security