User authentication and authorization methods
Who is this article for?
Incydr, no.
CrashPlan for Enterprise, no.
Code42 for Enterprise, yes.
CrashPlan for Small Business, yes.
This article applies to on-premises authority server version 5.
Note: This server version is no longer supported.
Overview
The Code42 platform supports several methods for user authentication and authorization. Authorization in the Code42 environment also includes user management. This article defines authentication and authorization, and explains which methods of authentication and authorization work together.
Authentication and authorization
The Code42 platform separates the concepts of user authentication and authorization, allowing administrators great flexibility in creating an environment that is highly customized to the needs of their organization in terms of security, scalability, employee productivity, and user management.
Authentication
Authentication refers to the process of identifying and verifying users. In the Code42 platform, this occurs when:
- Users sign in to the CrashPlan app or Code42 console
- Users are registered for the first time
Authentication can be done using the following methods:
- Local Code42 platform directory
- LDAP
- Single Sign-On (SSO)
- RADIUS
Authorization and user management
Authorization refers to the process of determining what roles and permissions a user is entitled to.
In the Code42 platform, authorization includes user management. User management allows the master server to automatically activate and deactivate users, move users into organizations, and assign roles to users.
In the Code42 console, authorization is referred to as the directory service.
Authorization can be done using the following methods:
- Local Code42 platform directory
- LDAP
Comparison of authentication and authorization methods
Each method of authentication and authorization has advantages for different situations. This list is not exhaustive, but gives a few of the highlights of each method.
Method | Capability | Advantages | Disadvantages | Scalability |
---|---|---|---|---|
Local | Authentication and/or authorization |
|
|
|
LDAP | Authentication and/or authorization |
|
| High |
SSO | Authentication only |
|
| High |
RADIUS | Authentication only |
|
| High |
Considerations
For some combinations of authentication and authorization/user-management, you must take further steps. See the relevant articles by clicking the links in the compatibility table below.
Compatibility table
This table explains which methods of authentication and authorization are compatible. To find out if a particular combination of authentication and authorization methods is compatible, simply choose the desired authentication method and the desired authorization method, and then find the cell where the two intersect.
Authentication Method | Authorization Method | |
Local | LDAP | |
Local | Yes | No |
LDAP | No | Yes |
SSO | Yes | Yes |
RADIUS | Yes | Yes |