Skip to content

Login Accounts

The Administration > Login Accounts page is used to manage the various login accounts which are permitted access to the system.

  • The first login account available in every system is the account which was configured in the Setup Wizard during the installation process. This account is given the "Administrator" role.

  • Credentials can be stored in a local database for each login account or a login can be linked to an external Microsoft Active Directory domain user account if an external Login Provider has been configured

  • If a login is linked to an external domain account then it will be listed in the Linked Domain Account column and any credentials previously stored in the local database will be treated as invalid
  • Login Accounts can be configured for Multi-Factor Authentication (MFA) using a time-based, one-time password authenticator app. If enabled, you can reset the MFA for logins from the list on this page.

Password Policy

The following password policy applies to UIP login accounts that are not linked to an external domain account.

  • Passwords must meet the minimum length of 9 characters
  • Passwords must contain at least one upper case, one lower case, one digit, and one special character
  • Passwords for newly created login accounts must be changed the first time they sign in
  • New password cannot match the previous 5 passwords of login account
  • Passwords expire every 90 days; a warning message is displayed when you select your account name in the upper-right corner of the page starting 15 days before your password is due to expire
  • Password expiration can be disabled for specific accounts

Add or Edit Login

Login accounts can be created and modified using the Administration > Login Accounts page.

  • Each login must have a unique Username
  • To access UIP, a login must be assigned a UIP Role
    • A selection of None means that the login will not have access to UIP services
  • To access applications defined in Administration > Client Applications, select a role of that application for the login
    • A selection of None means that the login will not have access to that client application
  • Each login may optionally Enable MFA

Configure External Login Provider

To reduce the number of logins that must be maintained by system administrators, it is possible to link each login to an account within a Microsoft Active Directory server.

To configure an external login provider, browse to the Administration > Login Provider page and then choose to Enable Sign In with Domain Account.

  • Enable Sign In with Domain Account cannot be disabled when there are login accounts configured to use domain authentication.
  • When enabled, an additional option will be available for every login account to Sign In with Domain Account.
  • Only secure (LDAPS) connections are supported to prevent transmitting unencrypted credentials over the network. Ensure that the port assigned has TLS configured.
  • The Administration > Login Accounts page cannot be used to modify information stored in the external directory.
  • Deleting a login in UIP has no effect on the Linked Domain Account in its external login provider.

UIP Roles

Every Login Account may have one of three UIP roles: Administrator, Manager, or User. This role determines to which pages and features of UIP a Login Account has access. If a Login Account is assigned a role of None, they will have no access to UIP.

The following table summarizes the pages and functionality each UIP Role has access to:

Page / Functionality Administrator Manager User
Workflows Yes Yes Yes
Workflow History Yes Yes Yes
Triggers Yes Yes Yes
Adapters Yes Yes Yes
Adapter Hubs & Hub Services Yes Yes Yes
Adapter Types Yes Yes Yes
Export Configuration Yes Yes Yes
Import Configuration Yes Yes Yes
Administration > About Yes Yes Yes
Administration > About > Upgrade Yes No No
Administration > About > Configure Registries Yes Yes No
Administration > Backup and Restore Yes Yes No
Administration > Login Accounts Yes No No
Administration > Login Provider Yes No No
Administration > Logging Events Yes Yes Yes
Administration > Logging Packages Yes Yes Yes
Administration > Client Applications Yes No No
Administration > Client Access Yes No No
Administration > Trusted CA Yes Yes Yes
Administration > Workflow Admin Yes Yes Yes
Administration > License Yes Yes Yes
Administration > License > Import Yes No No
Administration > Services Yes Yes Yes

Reset Lost UIP Login Account Password or Disable MFA

If for any reason the password(s) or MFA of all UIP Administrator login accounts are lost, there are password reset and disable MFA utilities which can be used to regain access to UIP. To access these utilities you must have root/sudo access to the UIP host machine.

The password reset utility can only reset passwords that are stored in the UIP Identity Server. It cannot reset the password of a login which is linked to an external domain account. After being reset, a password change will be required the next time the account is signed in.

The disable MFA utility can be used to reset the multi-factor authentication key for login accounts or linked domain accounts that are stored in the UIP Identity Server.

  1. Connect a terminal to the UIP host machine and login using an account with root or sudo access.

  2. Execute the following command to open a command shell into the NEC Identity Server container.

    sudo docker exec -it $(sudo docker ps --filter name=nap-apps_identity_server -q) ash
    
  3. Execute the NEC Identity Server container's List-Users command to list Login Accounts or Link Domain Accounts.

    dotnet Host.dll list-users
    
  4. Execute the NEC Identity Server container's Reset-Password command to reset a password for a local login account.

    dotnet Host.dll reset-password <username> <password>
    
  5. Execute the NEC Identity Server container's Disable-MFA command to disable MFA for a user.

    dotnet Host.dll disable-mfa <username>