User Management

Authentication Providers

Syndeia Cloud includes a configurable choice of Authentication Identity Providers for the users of the Syndeia Web Dashboard.

An Identity Provider is a repository of User Profiles for individuals that are recognized by the organization. Common Identity Providers include Microsoft Active Directory, OpenLDAP servers, numerous SAML2 IdPs, and Social Networking services such as Google, GitHub, and LinkedIn.

Syndeia Cloud v3.5 and later allows an organization to choose one or more of the following Identity Providers:

  • Local
    Syndeia acts as its own Identity Provider

  • LDAP
    Syndeia delegates authentication requests to an LDAP server that is available on the corporate network

    • Secure LDAP (LDAPS)
      Syndeia delegates authentication requests to a Secure LDAP server – a server that is using SSL for its LDAP URLs – that is available on the corporate network

    • Microsoft AD
      Using either the LDAP or the Secure LDAP configuration, Syndeia delegates authentication requests to a Microsoft Active Directory server that is available on the corporate network

  • SAML2
    Syndeia delegates authentication requests to the organization’s choice of SAML2 Identity Provider such as Ping Federate or Okta.

Authentication Provider Configuration Guides

Administrator Access

A Syndeia Cloud installation allows offers at least one super-user administrator account. The initial setting for the administrator account is name: super.user and password: syn45ia

To prevent accidental system lock-outs, the designated super user account cannot be deleted. 

 To change who the designated super user is, edit the web-gateway service's application.conf file and alter (or add a) super.user.email = "super.user@intercax.com" line, ex:  super.user.email = "mySuperUserAccountname".  

 We strongly recommend changing the username and password from the default.  

Managing Users

Visit to perform these operations.