Security Configurations
To learn more about the Incorta security model and optional security configurations, first review the Incorta Security Guide.
For more details on to secure Incorta, review the following topics:
-
- Monitor Logins and Access
- [Use Incorta Login ((/4.8/self-sync)
- Use OneLogin SSO
- Use Directory Services SSO
- Use ADFS SSO
- Use IBM CIS SSO
- Use Okta SSO
- Mobile SSO
- Configure LDAP
- Enable and Test SSO