User Management
Authentication Providers
Syndeia Cloud includes a configurable choice of Authentication Identity Providers for the users of the Syndeia Web Dashboard.
An Identity Provider is a repository of User Profiles for individuals that are recognized by the organization. Common Identity Providers include Microsoft Active Directory, OpenLDAP servers, numerous SAML2 IdPs, and Social Networking services such as Google, GitHub, and LinkedIn.
Syndeia Cloud v3.5 and later allows an organization to choose one or more of the following Identity Providers:
Local
Syndeia acts as its own Identity ProviderLDAP
Syndeia delegates authentication requests to an LDAP server that is available on the corporate networkSecure LDAP (LDAPS)
Syndeia delegates authentication requests to a Secure LDAP server – a server that is using SSL for its LDAP URLs – that is available on the corporate networkMicrosoft AD
Using either the LDAP or the Secure LDAP configuration, Syndeia delegates authentication requests to a Microsoft Active Directory server that is available on the corporate network
SAML2
Syndeia delegates authentication requests to the organization’s choice of SAML2 Identity Provider such as Ping Federate or Okta.
Authentication Provider Configuration Guides
Administrator Access
A Syndeia Cloud installation allows offers at least one super-user administrator account. The initial setting for the administrator account is name: super.user
 and password: syn45ia
To prevent accidental system lock-outs, the designated super user account cannot be deleted.Â
 To change who the designated super user is, edit the web-gateway service's application.conf
 file and alter (or add a) super.user.email = "super.user@intercax.com"
 line, ex: super.user.email = "mySuperUserAccountname"
. Â
 We strongly recommend changing the username and password from the default. Â
Managing Users
Visit https://intercax.atlassian.net/wiki/spaces/SYN35/pages/2922179558 to perform these operations.