Login Configuration

Use the Login Configuration page to set an application for authentication verification. For example, if all of the users in your organization are set up with roles and authorization in an LDAP server, use that server to verify users logging into IdentityIQ. Login Configuration has the following tabs:

Authentication Method Processing Order

IdentityIQ attempts to authenticate users by all enabled methods before reporting login failure. The methods are executed in this order, skipping any disabled methods:

  1. Single Sign On (Rule-based or SAML)

  2. Pass-Through Authentication

  3. Internal IdentityIQ Authentication

Note: If configured, Multi-Factor Authentication follows the initial user authentication through any of these means.