Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

PowerProtect Data Manager 19.10 Security Configuration Guide

Component access control

Component access control settings define how to control external and internal systems or component access to the product.

PowerProtect Data Manager uses validated tokens to provide secure operations and data transfer between components.

Only authenticated users can use the UI to perform operations. When a user logs in to the UI, the user verification process, or requestor contacts the Authentication Service to verify the credentials of the user account. When the Authentication Service successfully verifies the user, the application issues a token to the requestor. All the PowerProtect Data Manager components that require authentication can use the token to verify the user. After the Authentication Service authenticates the user by using the token, the Authentication Service determines the level of authorization that the user has to perform the requested operation.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\