Authentication

Authentication is a global server configuration property that controls user authentication and authorization process.

External Authentication

Key name in the configuration file: externalAuthentication

Value type: String

Possible values: Disabled (other values depend on active plugins)

Default value: Disabled

Controls external authentication of Iotellect Server users, such as authentication via LDAP / Microsoft Active Directory.

External Registration URL

Key name in the configuration file: externalRegisterLink

Value type: String

Possible values: Any valid URL

Default value: ""

URL to that a user will be redirected for an external registration from the web UI. This setting is used to allow users to register in a third-party system and then use external authentication to access Iotellect Server.

Multi-Factor Authentication

Key name in the configuration file: multiFactorAuthenticationAction

Value type: String

Possible values: Context path to a workflow that returns a boolean value

Default value: ""

Allows a custom authentication workflow to be specified for all users. If a workflow is indicated, it is launched upon every login attempt and dictates whether a user is granted access. The specified workflow must return a boolean-like value (True, 1) for successful authentication. Any other return value, or a failure to execute the workflow, will deny access.

Important Considerations:

  • Global Effect: The authentication workflow will be launched for all users.

  • Anonymous Permissions: The authentication workflow must have "Operator" permissions granted via Anonymous Permissions. This should be configured before activating the MFA.

  • Lockout Risk: Incorrectly configuring the authentication workflow (for example, using an authentication workflow that returns a non-boolean value, or has insufficient anonymous permissions) will lock all users out of the system, including administrators.

  • Safe Mode Bypass: In the event of a lockout, Multi-Factor Authentication can be disabled by restarting the server in safe mode.

User Connection Mode

Key name in the configuration file: userConnectionMode

Value type: Integer

Possible values: 0 for Allow Concurrent Connections, 1 for Disconnect Last and 2 for Restrict Concurrent Connections

Default value: 0

Defines different user connection policies.

  • Allow Concurrent Connections mode enables you to log into the system multiple times using the same user

  • When Disconnect Last mode is enabled every new connection to the server terminates old session with the same user

  • Restrict Concurrent Connections mode makes it impossible to log into the system with the user that is already connected

Some user interfaces created in the Web UI may establish more than one simultaneous connection with the server.

Such multi-connection UIs will not be compatible with Disconnect Last and Restrict Concurrent Connections modes.

New User Activation Expression

Key name in the configuration file: newUserActivationExpression

Value type: String

Possible values: Expression

Default value: Null

Allows to execute custom expression on user registration. If result is evaluated to null user will be activated, otherwise account will be disabled. The default context for expression is a context of new user.

Number of Login Attempts

Key name in the configuration file: numberLoginAttempts

Value type: Integer

Possible values: 1 or more

Default value: 3

Number of unsuccessful login attempts allowed before a user account will be locked for period of time specified by Account Lockout Duration.

Account Lockout Duration

Key name in the configuration file: accountLockoutDuration

Value type: Integer

Possible values: 1 or more

Default value: 30000

Period of time for that a certain user's login will be prohibited after several unsuccessful login attempts.

Timeout Before Next Login Attempt

Key name in the configuration file: timeoutBeforeNextLoginAttempt

Value type: Integer

Possible values: 1 or more

Default value: 5000

Minimal time period allowed before login attempts. If another login attempt is performed before this period elapses after an unsuccessful login attempt, the new attempt will fail regardless of whether the credentials are correct.

Was this page helpful?