15.6 Considerations for user authentication
Consider the authentication servers used to manage JP1 users.
To monitor the system operation in JP1/IM, the user logs in to JP1/IM - Manager on the manager from JP1/IM - View. The authentication server authenticates the user at login, and the user's operating permissions are returned to JP1/IM - View. In JP1/IM, this processing flow is called user authentication.
In JP1/IM, user authentication setup is required on the managers and on the host on which JP1/Base serves as the authentication server. (For details about setting up user authentication, see the description of setting up the user management functionality in the JP1/Base User's Guide.)
- Organization of this section