The Code42 platform supports several methods for user authentication and authorization. Authorization in the Code42 environment also includes user management. This article defines authentication and authorization, and explains which methods of authentication and authorization work together.
Authentication and authorization
The Code42 platform separates the concepts of user authentication and authorization, allowing administrators great flexibility in creating an environment that is highly customized to the needs of their organization in terms of security, scalability, employee productivity, and user management.
Authentication refers to the process of identifying and verifying users. In the Code42 platform, this occurs when:
- Users sign in to the Code42 app or administration console
- Users are registered for the first time
Authentication can be done using the following methods:
- Local Code42 platform directory
- Single Sign-On (SSO)
Authorization and user management
Authorization refers to the process of determining what roles and permissions a user is entitled to.
In the Code42 platform, authorization includes user management. User management allows the authority server to automatically activate and deactivate users, move users into organizations, and assign roles to users.
In the administration console, authorization is referred to as the directory service.
Authorization can be done using the following methods:
Comparison of authentication and authorization methods
Each method of authentication and authorization has advantages for different situations. This list is not exhaustive, but gives a few of the highlights of each method.
|Local||Authentication and/or authorization||
|LDAP||Authentication and/or authorization||
|SCIM Provisioning||Authentication only||
This table explains which methods of authentication and authorization are compatible. For some combinations of authentication and authorization/user-management, you must take further steps. See the relevant articles by clicking the links in the compatibility table below.
|Authentication Method||Authorization Method|