Authentication Schemes

Authentication Schemes

This course identifies the methods that can be used to create users and assign permissions in ExtraHop.

rate limit

Code not recognized.

About this course

By the end of this module, you will be able to:
1) Identify the ways users are able to access ExtraHop
2) List the remote authentication options available in ExtraHop
3) Recall the limitations of user and user group configuration

Course Contents3 min

  • Authentication Schemes

    Authentication Schemes video

  • Authentication Schemes Video 3 min
  • Additional Resources

    Links to ExtraHop Documentation and/or relevant articles

  • Additional Resources
  • Authentication Schemes Quiz

    Authentication Schemes knowledge check quiz

  • Authentication Schemes Quiz

About this course

By the end of this module, you will be able to:
1) Identify the ways users are able to access ExtraHop
2) List the remote authentication options available in ExtraHop
3) Recall the limitations of user and user group configuration

Course Contents3 min

  • Authentication Schemes

    Authentication Schemes video

  • Authentication Schemes Video 3 min
  • Additional Resources

    Links to ExtraHop Documentation and/or relevant articles

  • Additional Resources
  • Authentication Schemes Quiz

    Authentication Schemes knowledge check quiz

  • Authentication Schemes Quiz