Manage users

This topic describes user management in Micro Focus Connect.

User types

Users are defined through different channels. The login credentials for each user type are detailed below:

Channel Description Login credentials
Default user

The installation creates a default user.

Security Role: Site


User: Administrator

Authenticator: Default / Micro Focus Connect

Authenticator users

If you defined a Data Source as an Authenticator, users in the data source can access the product.

Security Role: User

User/Password: As defined in the data source.

Authenticator: The data source Authenticator.

User window

Additional users defined in the Users window.

For details, see Define additional users.

Security Role: As defined by the admin.

User/Password: As defined by the admin.

Authenticator: "Default" or "Micro Focus Connect"

Back to top

Add an authenticator provider

You can allow users to log in using their credentials from one of the data sources. To enable this, you need to add an authenticator provider.

To add an authenticator provider:

  1. On the top banner, click Authenticators.
  2. Click the Add Authenticator Provider button.
  3. In the Create Authenticator dialog box, select the Authenticating Product, and type a name by which to identify the new authenticator.

    The next time users open the login page, they will be able to select the new authenticator.

Back to top

Define additional users

You can define additional users in the Users window. Each user is assigned a Security Role.

To add a user:

  1. On the top banner, click Users.
  2. Click the Add User button.
  3. In the new row, enter a user name and password. Passwords need to follow certain rules. For details, see Password rules.

  4. Select a Security role to a assign to the user. For a description of the security levels, see Security roles.

Users that you add through the Users window need to select the default Micro Focus Connect authenticator when logging in.

Password rules

Passwords need to comply with the following rules:

  • Must be eight to twenty characters in length.
  • Must contain one lowercase character.
  • Must contain one uppercase character.
  • Must contain one numeric character.
  • Cannot contain more than three consecutive characters identical to your user name.
  • Cannot contain the same character more than two times.
  • Cannot contain a repeated string with more than three characters more than one time.
  • New passwords cannot contain more than three consecutive characters identical to the current password.
  • Passwords expire after ninety days.

Back to top

Security roles

The following table describes the actions that users assigned to each security role can perform.

Action Security Role
  Site Admin User
Create Site users
Create Admin users
Create users
Create authenticators
Read/write global settings
Create data sources
Create connections
Create/delete user maps (version 24.1.1 and later)
Import/export (version 24.1.1 and later)
Backup the database (version 24.1.1 and later)
Import/export cross references (version 24.1.1 and later)

Back to top