Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

Application Server

Manage users and groups through windows

  • Last UpdatedJul 19, 2024
  • 1 minute read

When you configure security, you may choose to do one of the following:

  • Keep the configuration local to a single application.

  • Share the configuration between multiple applications.

  • Manage the configuration as part of the network domain (for example, using Active Directory). This option typically allows users to have the same user account for the network, the host, and the ICS software. Using Active Directory gives you the following advantages:

    • A centralized repository for user and group data, enabling effective implementation of security policies and procedures.

    • Provides a single point of access to all network resources after the user is identified and authenticated.

To manage users and groups:

  • First define a specific role for each group, and then configure the group privileges to fit that role.

  • Groups may overlap, but it is often better to have clearly separate groups and then assign individual users to multiple groups, if necessary.

  • Set or change the password for the ICS software's default user (e.g., "guest").

  • Define stringent password policies to force users to create strong passwords. Enforce mandatory password updates on a regular basis.

TitleResults for “How to create a CRG?”Also Available in