Related Articles
FAQs on Encryption at Rest
What are symmetric keys? A symmetric key or a secret key is an input to the encryption algorithm that helps produce a different output for different values provided at any given time. It is used for both encryption and decryption of data. What is a ...
Request- Additional Fields
Based on your requirements, the default request record can be customized using different types of additional fields. This is useful to capture request-related additional information. To configure additional fields: 1. Go to Admin>>Helpdesk ...
Configuring ADFS 3.0 as the Identity Provider
Before you start the configuration process, make sure that the SupportCenter Plus application is running in the HTTPS mode. Then, configure SupportCenter Plus as a Relying Party Trust (RPT). This can be done either manually or using the metadata ...
Read-Only User
Read-Only User has exclusive permissions to read information in the database, modify select data, and execute secure query reports to improve the security level of the application. You can check the security level of the application under Global ...
SAML Authentication
SAML Authentication Security Assertion Markup Language(SAML) brings an easier alternative to conventional sign-in methods already available for online services. Users will no longer have to provide passwords specific to each service they access. ...