OneLogin Protect for Android is a mobile authenticator app that provides a one-time-password (OTP) as an additional authentication factor. ... Since you likely always have your phone nearby, it mak...
Since you likely always have your phone nearby, it makes for an easy and convenient way to authenticate your account. ... OneLogin Protect is also available for <a href="https://onelogin.service-no...
User policies provide you and your organization with the best security requirements for your needs, by allowing you to choose specific security restrictions and protocols, then apply them to either...
This article provides an overview of administrative privileges in OneLogin. ... The following topics are included. ... Prerequisites ... Only account owners and super users have the ability to gran...
Active Directory Connector 5 provides significant performance improvements, firewall-friendliness, and support for HTTP proxy servers. ... If your HTTP proxy server requires authentication, ADC 5 p...
The Account Owner of a OneLogin tenant has exclusive access to account-level settings located the OneLogin admin portal under Settings > Account Settings. ... These options determine broadly-applie...
OneLogin can sign users into applications using various mechanisms, of which the most robust and secure is SAML. ... SAML works in all browsers, but unfortunately not all applications support SAML.
This article covers the following topics: ... About Roles ... The most efficient way to control your users' access to apps is through OneLogin roles. ... A role in OneLogin is simply a collection o...
For an organization whose users use many SAML applications, having multiple SAML certificates is a convenient and powerful way to ensure stronger security between those applications and OneLogin.
The OneLogin SAML Custom Connector (Advanced) allows you to build a custom application connector for applications that are unavailable in the OneLogin catalog, e.g. internally developed apps used b...
The Trusted IdP (identity provider) feature in OneLogin enables you to configure multiple identity providers to securely sign users into OneLogin and OneLogin-protected applications. ... This allow...
Whether you're using OneLogin internally or providing it to your customers, it's important to have control over your platform's appearance and create an environment that reflects the visual persona...
We have updated the list of IP addresses we recommend organizations explicitly allow for outbound traffic coming from our on-premises agents such as Active Directory Connectors, LDAP Connectors, Pr...
Many network appliances can be configured to use a RADIUS server for user authentication. ... For example, when a user establishes an IPsec VPN using their desktop VPN client, the network appliance...
This document details how to install and uninstall OneLogin Desktop for the macOS. ... Earlier versions of OneLogin Desktop are not compatible with macOS Monterey or later. ... Swift 5 Runtime Supp...
As you might guess from the name, MFA uses multiple different factors to authenticate users instead of just one. ... In a typical single-factor authentication (SFA) scenario, the user signs in with...
The content of this article has been incorporated into Configuring the RADIUS Server Interface.
The content of this article has been incorporated into Configuring the RADIUS Server Interface. ... For additional assistance with FortiGate's RADIUS configuration, please consult the Fortinet docu...
The content of this article has been incorporated into Configuring the RADIUS Server Interface. ... For additional assistance with FortiGate's RADIUS configuration, please consult the Fortinet docu...
The content of this article has been incorporated into Configuring the RADIUS Server Interface. ... For additional assistance with Ubiquiti's RADIUS configuration, please consult the UniFi document...
The content of this article has been incorporated into Configuring the RADIUS Server Interface. ... For additional assistance with F5 BIG-IQ's vendor-specific attributes for RADIUS configurations, ...
The content of this article has been incorporated into Configuring the RADIUS Server Interface. ... For additional assistance with Global Protect's RADIUS configuration, please consult the Palo Alt...
The content of this article has been incorporated into Configuring the RADIUS Server Interface. ... For additional assistance with Check Point's RADIUS configuration, please consult the Check Point...
The content of this article has been incorporated into Configuring the RADIUS Server Interface.
The content of this article has been incorporated into Configuring the RADIUS Server Interface. ... For additional assistance with configuring Windows for EAP authentication, please consult the Mic...
© 2023 ALL RIGHTS RESERVED. Feedback Terms of Use Privacy Cookie Preference Center