Security module manages user authentication, authorization, and access control.
Modules → Security | Tutorial | How-to Guide | Reference
Security Module Configuration Workflow | ||
---|---|---|
Step | Action | Description |
Define Groups | Create user groups | Set permission levels for each group |
Create Users | Add user accounts | Assign users to groups and set individual permissions |
Configure Policies | Set security rules | Define password requirements and session controls |
Setup External Auth | Configure AD/LDAP | Connect to enterprise authentication systems |
Define RuntimeUsers | Configure database | Setup encrypted SQL storage for dynamic users |
Users authenticate through local credentials, Active Directory, LDAP, or external databases. Session policies control timeout, concurrent logins, and automatic logoff.
Permissions are evaluated at multiple levels:
All security events are logged including logins, permission changes, and critical operations for compliance tracking.
Security Module LinksExplanation - to understand concepts→ Modules / User Interactions / Security Module Tutorials - to learn by doing→ Tutorials / User Interactions / Security Module Tutorial How-to Guides - to accomplish specific tasks→ How-to Guides / User Interactions / Security Module How-to Guide Reference - technical details→ Technical Reference / User Interactions / Security Module Reference |