Authorization

You can monitor the FraudOne system without being authorized. If you want to view the log or change the status of the system (start or stop servers, changing the trace level, etc.), you have to provide your authentication.

This is done by logging in and typing a user id and a password. This information is passed to a configured FraudOne authentication and authorization server for validation. Installations without an authentication or authorization server cannot be controlled using the Server Monitor.

Each command you send to a Server Manager also contains your authentication information. The Server Manager will check this information against its list of users and processes or rejects the command accordingly. Thus, each command will be verified separately.

If you manage more than one computer, all of these must share the same user management database.

See Authentication process.