User Groups
User group access management
Last updated
Was this helpful?
User group access management
Last updated
Was this helpful?
Haltdos Cloud provides multi-level RBAC access control over Stack. This allows owners to assign users with respective permissions on Haltdos Cloud.
Go to WAF > User group.
Click on Add group.
Configure the settings.
Click Save Changes.
Group Name
String
Blank
Authentication Type
Drop-down
Basic auth
Group Name
Users can specify the user-friendly group name as per the need.
Authentication Type
Users can set the type of authentication used for the user group. Users can select from the below-mentioned authentication methods;
Basic Auth - Basic Authentication is a method for users to provide a username and password when making a request for access. The method is used by the request’s recipient to verify users’ identity and rights to access a resource.
Key Auth - Key authentication is used to solving the problem of authenticating the keys of the person (say "person B") to whom some other person ("person A") is talking to or trying to talk to.
JWT - JSON-based standard for passing claims between parties in web application environments JSON Web Token (JWT) is a proposed Internet standard for creating data with optional signature
HMAC - HMAC (Hash-based Message Authentication Code) is a type of message authentication code (MAC) that is acquired by executing a cryptographic hash function on the data (that is) to be authenticated and a secret shared key.
LDAP - Lightweight Directory Access Protocol (LDAP) is an internet protocol that works on TCP/IP, used to access information from directories.
Users can customize the user group settings and add/delete/change credentials for the users added to the user group.
Go to WAF > User group > click on the group name.
Configure the settings.
Click Save Changes.
Hide Credentials
Boolean
0
User enabled
Boolean
1
Name
String
Blank
User Name
String
Blank
Password
String
Blank
Users can specify either to enable it to strip the credential from the request (i.e. the Authorization header) before proxying it.
Users can enable or disable users as per the requirement.
Users can specify the name of the users for identification purposes.
Users can specify the username for the user.
Users can specify the password for the user.