|Security / Authentication|
Configure Password or Kerberos authentication, and enable secure (https) connection through the Vocera Platform Web Console.
Select the Use Password checkbox to allow an account password to be used as the authentication method for user access to the Vocera system. This option can be enabled or disabled.
Before disabling this option, ensure that at least one role has the Advanced Support policy, or an LDAP user is assigned a role with the Advanced Support policy. When no authentication method is selected, the following warning displays:
Warning: There are no LDAP users with administrative privileges. Disabling password authentication may prevent administration from accessing the Vocera Platform Web Console.
Select the Use Kerberos checkbox to use this protocol to authenticate user's access to the Vocera system.
Select Use Kerberos to display the Keys configuration field.
A message displays to remind you to upload a keytab file.
Select Browse and locate the Kerberos keytab file to apply, then select Upload.
Review the uploaded keytab entries displayed in the Keys list.
Enter the IP address for a Trusted Proxy.
In a clustered environment when the trusted proxy utilizes an application delivery controller (ADC), such as F5 BIG-IP or Citrix Netscaler, the system must be configured to handle proxied requests made by a trusted proxy.
By default, incoming requests with the proxy's source IP are rejected. Enter the trusted proxy information in the Authentication Settings to allow the proxy IP to be replaced with the remote client IP of a HTTP workflow device, such as CUCM.