DSX Active Directory Authentication for authenticating operator logins
Technical Specification
- Make: DSX
- Model code: Active Directory Authentication
WinDSX SQL can now utilize complex logins and passwords facilitated by Active Directory in Windows™. Operator Logins can be authenticated by Active Directory instead of WinDSX. To configure this, the WinDSX SQL Operators use the same Login Name as they do in Windows™. Their Login name is entered like always under Operator Passwords. The Operator is assigned a Password Profile but is not assigned a Password. When WinDSX SQL receives a login from an operator that does not have a password in it’s database it sends the login request to Active Directory (AD) for authentication. If AD authenticates the operator they are given access to WinDSX SQL according to the Password Profile assigned to them.
Read moreMake | DSX |
---|---|
Manufacturer | DSX - Europe Ltd. |
Category | Access Control>Access control software |
Model code | Active Directory Authentication |
Additional info |
WinDSX SQL can now utilize complex logins and passwords facilitated by Active Directory in Windows™. Operator Logins can be authenticated by Active Directory instead of WinDSX. To configure this, the WinDSX SQL Operators use the same Login Name as they do in Windows™. Their Login name is entered like always under Operator Passwords. The Operator is assigned a Password Profile but is not assigned a Password. When WinDSX SQL receives a login from an operator that does not have a password in it’s database it sends the login request to Active Directory (AD) for authentication. If AD authenticates the operator they are given access to WinDSX SQL according to the Password Profile assigned to them. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download