Authentication verifies the identity of a user who attempts to access the system. Assess how authentication is handled by your existing environment before deciding how to manage security within BusinessObjects Enterprise.
The current release supports these methods of authentication:
To use any of the third-party methods of authentication or Trusted Authentication, you must configure them before you use them with BusinessObjects Enterprise. For detailed instructions, see the Configuring third-party authentication section of the BusinessObjects Enterprise Administrator’s Guide.
For information about how to configure primary authentication or single sign-on, see the Security concepts section of the BusinessObjects Enterprise Administrator’s Guide.
|
Copyright © 2010 CA.
All rights reserved.
|
|