Alliance Software: User Authentication Methods
Understand the 4 authentication methods available in the Alliance software. Learn the benefits of two-factor authentication methods and the different ways to implement it in your organisations.
Disclaimer: This module is Release 7.4 compliant (some images in this module use earlier releases of the software. Since release 7.3 File Transfer is removed, and therefore the following menus are removed: The File Transfer and Queues menus and the File Transfer configuration node).
Learning objectives:
Disclaimer: This module is Release 7.4 compliant (some images in this module use earlier releases of the software. Since release 7.3 File Transfer is removed, and therefore the following menus are removed: The File Transfer and Queues menus and the File Transfer configuration node).
Learning objectives:
- Differentiate between single factor and two-factor authentication methods
- Identify the four authentication methods available on Alliance software
- Name at least one benefit of implementing two-factor authentication
- Identify the authentication methods that can be configured to use two-factor authentication
- Recall at least two of the Alliance software that support LDAP and RADIUS authentication
Training details
Category | Deploy and Manage Software Solutions Security and Audit |
Duration | 00:15 |
Level |
Advanced
|
Language | English |
Has sound | No |