9.2 Configuring Tenancy Settings

IMPORTANT:The Tenancy Settings are not available in Advanced Authentication as a Service (SaaS) version

A top administrator can enforce the configurations of a method on secondary tenants. After configuring a method, you can lock the settings for that specific tenant. The tenant cannot edit the locked settings in the tenant administrator console.

To enforce the configurations for a specific tenant, perform the following steps:

  1. Click the Edit icon next to the authentication method for which you want to enforce the configurations.

  2. In Tenancy settings, click +.

  3. Move the tenant to whom you want to enforce the configurations from Available to Used list in the Force the configuration for the tenants section.

  4. After you add a tenant, the Hide forced settings option is displayed. You can turn this option to ON if you want to hide the settings that you have enforced on the tenant.

  5. Click Save.

After configuring the authentication methods, you must create an authentication chain and map the configured methods to the chain. You can also create a chain with a single method. For example, you can create different authentication chains for an organization that has two departments, IT and Finance. For the IT department, you can create a chain with Password and Smartphone methods. For the Finance department, a chain with only the Fingerprint method can be created. For more information about creating chains, see Creating a Chain.

The methods do not appear in the Self-Service portal until you include them in a chain, and link that chain to an event.