Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Work Tasks

Enterprise Console Authentication

  • Last UpdatedJun 19, 2025
  • 2 minute read

To log on to the Enterprise Console:

  1. Select the user provider from which you want to log in.

    For example, select Repository User Provider.

  2. Enter your User Name and Password on the Login page. 

  3. Click Login.

    For the default user name and password, contact the technical support team or refer to the Get Started Guide in the ISO file of AVEVA Work Tasks. Passwords are not stored even if your browser offers to save them.

    Important:

    Access Requirements and Authentication Behaviour
    - Users must belong to a user provider that has been configured for the repository they are trying to access. For more information on setting up user providers, refer to Configure User Providers.
    - Users can log on to any Enterprise Console instance that is mapped to the repository.
    - If Active Directory is selected as Resource Provider and ASTS is enabled, authentication is performed by ASTS.
    - To access the same website from a different machine, you can use the IPv6 address without the scope ID in all supported browsers. For example:
    IPv6 with Scope ID = fe80::91fb:becc:2c79:948b%14
    IPv6 without Scope ID = fe80::91fb:becc:2c79:948b

    Invalid Login Attempts
    - If you enter the wrong password several times in a row, the system will start adding a delay before you can try again. This delay increases with each failed attempt, up to a default maximum of 30 minutes. Administrators can configure this delay if needed. These timeouts help prevent brute-force attacks.
    - If you're locked out due to repeated failed attempts, you’ll need to wait for the required delay (even after resetting your password) before logging in again. To regain access immediately, an IIS reset can be performed.
    - Additionally, it is recommended to use secure configuration options provided by your authentication provider to further enhance overall login security.

Related Links
TitleResults for “How to create a CRG?”Also Available in