In addition to local user management, the UX allows you to authenticate remote users using the following supported providers:
For these remote users to operate the UX system, you must configure their access level permissions by mapping their remote Group (in the case of AD) or Class (in the case of RADIUS) to the desired UX access level. This mapping configuration will dictate the UX-based permissions for your remotely authenticated users:
- Managing Active Directory Groups to Access Level Mapping
- Managing RADIUS User Class Access Level Mapping
Remote User Storage and Authentication
Remote users are not stored on the UX system, instead they live on the remote authentication providers. Remote user authentication happens over the network with the appropriate external provider which is transparent to the user.