A key decision when deploying SquaredUp is how users will authenticate (log on). You can choose between Forms authentication and Windows authentication. A single SquaredUp instance (website) can be configured for either Forms authentication or Windows authentication, but not both. The two schemes are described below.
You can also choose to make certain dashboards available to all users within your organization without requiring authentication. These are called Open Access dashboards (see below).
To access SquaredUp interactively, a user must authenticate with the web application using his or her Windows credentials. These credentials are used to access SCOM and SCOM's role-based access control (RBAC) is used to determine which - if any - resources the user can access. For more information about role-based access control and SCOM permissions see About Role-Based Access Control
By default, SquaredUp is installed with Forms authentication enabled. Forms authentication requires the user to enter his or her username and password to log on.
To use Forms authentication you do not need to make any changes after installation. If you have previously configured Windows authentication and want to switch back to Forms authentication see How to configure Forms authentication.
SquaredUp can instead be configured to use Windows authentication. Windows authentication is also known as Integrated Windows Authentication (IWA), Single Sign-On (SSO) and Pass Through Authentication.
With Windows authentication enabled, the browser automatically authenticates to SquaredUp using the user's Windows credentials. The user does not need to explicitly log on to the application.
In some scenarios, configuring Windows authentication can be more complex. If you are planning a new deployment of SquaredUp and require Windows authentication, we recommend you install SquaredUp on a SCOM management server.
To enable Windows authentication see How to configure Windows authentication
In addition to authenticated access to SquaredUp, certain dashboards can be published as Open Access. This enables them to be shared across the organization and viewed without users needing to authenticate, or to have any SCOM permissions. To learn more about Open Access see About Open Access