Authentication settings

You may select your preferred authentication method, either Local only or Local/Microsoft, when logging in.
Note: This configuration should be performed by your System Administrator or equivalent role.
 
 
Select "Local" if you wish to log in using the account credentials sent by iSpec.
 
Select "Local / Microsoft" if you wish to log in using your Local or Microsoft account.
 
Enter the following details:
 
ClientID
This is a unique identifier assigned to your application when you register it with the Microsoft Azure portal. It is used to identify your application when making authentication requests.
 
 
Tenant
This refers to the Azure Active Directory (AAD) tenant where your application is registered. It can be a specific organization or a multi-tenant environment. You need to specify the tenant ID or the tenant domain name when performing authentication.
 
 
RedirectURI
This is the URL where Microsoft will redirect the user after successful authentication. It should be registered as one of the valid redirect URIs for your application in the Azure portal.
 
 
Ensure that the fields are properly configured to ensure proper functionality.
 
 
 
Two Factor Authentication
It is a security measure used to protect user accounts and systems by requiring two different forms of identification before granting access. It adds an extra layer of security beyond just a username and password combination.
 
If you prefer not to use two-factor authentication for your account, you can easily select the "Not Configured" option to disable this security feature.
 
 
You can select the "Email" option to receive the two-factor authentication code in your email.
 
 
Select the user group that you want to apply two-factor authentication to.
This group may already exist, or you may need to create a new one specifically for users who will use two-factor authentication.
 
 
 
 
Once two-factor authentication is configured, users logging in will be required to enter the authentication code that is sent to their email in order to gain access to the system.
Copyright Remy InfoSource Pte Ltd 2019