This section describes the different authentication mechanisms of ADONIS. The authentication mechanisms can be used separately or in combination. Depending on the used authentication mechanisms, further installation-specific configuration steps may be necessary. Please consult your ADONIS consultant for further information.
| Standard ADONIS users | - ADONIS users are created in the ADONIS Administration.
- Login to ADONIS requires input of username and password. These credentials are used to authenticate the user against the available data in the ADONIS database.
- The assignment of user attributes, rights and system roles is controlled in the ADONIS Administration.
|
| LDAP Authentication | - Users can either be imported from a directory service or mapped to ADONIS users.
- Login to ADONIS requires input of username and password. The provided credentials will be used to authenticate the user against the configured directory service.
- A precondition for this scenario is that the connection of ADONIS to the directory service in use (e.g. Active Directory) is established in the ADONIS Administration.
- The assignment of user attributes, rights and system roles may be controlled in the ADONIS Administration or synchronised with an external directory service.
- Specific configuration steps are necessary when setting up ADONIS for this authentication mechanism. Please consult your ADONIS consultant for further information about this authentication mechanism.
|
| IDM Authentication | - Users can either be imported from an external user management system or mapped to ADONIS users.
- Login to ADONIS via single sign-on is possible using an Identity Management System (IDM)
- A precondition for this scenario is the connection of ADONIS to an authentication server in the target environment which provides means for authentication with an external user management system (e.g. Microsoft Internet Information Services connected to an Active Directory).
- The assignment of user attributes, rights and system roles may be controlled in the ADONIS Administration or synchronised with an external user management system.
- Specific configuration steps are necessary when setting up ADONIS for this authentication mechanism. Please consult your ADONIS consultant for further information about this authentication mechanism.
|
| SAML Authentication | - Users can either be imported from an external user management system or mapped to ADONIS users.
- The external user management system must provide an Identity Provider (IdP) for SAML 2.0 (e.g. Active Directory Federation Services [AD FS] or Shibboleth).
- To log on to ADONIS, the user is redirected to the IdP. Depending on the configuration of the IdP, the authentication is carried out via single sign-on or by entering access data (username and password, certificates, etc.).
- No server-to-server communication is necessary for this authentication mechanism, since all data is transmitted via the browser.
- The assignment of user attributes, rights and system roles may be controlled in the ADONIS Administration or synchronised with an external user management system.
- Specific configuration steps are necessary when setting up ADONIS for this authentication mechanism. Please consult your ADONIS consultant for further information about this authentication mechanism.
|
| OIDC Authentication | - Users can either be imported from an external user management system or mapped to ADONIS users.
- A precondition for using OpenID Connect (OIDC) is the connection of ADONIS to an OpenID Connect provider (OP) that verifies the identity of the user as well as provides basic profile information about the user.
- To log on to ADONIS, the user is redirected to the OP. Login to ADONIS via single sign-on is possible using OIDC authentication.
- The assignment of user attributes, rights and system roles may be controlled in the ADONIS Administration or synchronised with an external user management system.
- Specific configuration steps are necessary when setting up ADONIS for this authentication mechanism. Please consult your ADONIS consultant for further information about this authentication mechanism.
|
This table contains a summary of the features of the different authentication mechanisms.