Skip to end of metadata
Go to start of metadata

In addition to local user management, the UX allows you to authenticate remote users using the following supported providers:

For these remote users to operate the UX system, you must configure their access level permissions by mapping their remote Group (in the case of AD) or Class (in the case of RADIUS) to the desired UX access level. This mapping configuration will dictate the UX-based permissions for your remotely authenticated users:

Remote User Storage and Authentication

Remote users are not stored on the UX system, instead they live on the remote authentication providers. Remote user authentication happens over the network with the appropriate external provider which is transparent to the user.