-
Notifications
You must be signed in to change notification settings - Fork 475
NTLM User Authentication
Note: This feature is available in Enterprise, AWS, and Team editions only.
NTLM (NT LAN Manager) Authentication is a protocol used by Microsoft to authenticate users and provide secure network communications. NTLM uses a challenge-response mechanism for authentication, where the user credentials are never sent over the network directly. For detailed setup and configuration of NTLM, refer to the official NTLM documentation.
-
As an administrator, go to Settings -> Server Configuration.
-
Find and activate the NTLM option in the Configuration section.
-
Save the changes.
-
As an administrator, navigate to Settings -> Identity Providers.
-
Click on the + Add button.
-
Fill in the following fields:
Field Description Provider Select NTLM
from the dropdown menu.ID Enter a unique identifier for the configuration. Configuration name Enter a descriptive name for this configuration. Description Provide a brief description of this identity provider configuration. Icon URL Enter the URL of an icon to represent this provider. Disabled Leave unchecked to enable this identity provider. Host Enter the server hostname or IP address where NTLM authentication is handled. Port Specify the port number used for NTLM communication. Domain Enter the Windows domain name against which the NTLM server authenticates. -
Click on the Create button.
-
With the NTLM configuration now established, proceed to the login screen.
-
Select the NTLM authentication method, labeled with the Configuration name you specified.
-
Fill in your User name and User password to log in.
- Getting started
- Create connection
- Connection network options
- Supported databases
-
Drivers management
- Database authentication methods
- Database navigator
- Properties editor
- Data editor
- SQL editor
-
Entity relation diagrams
- Cloud services
-
AI Smart assistance
- Data transfer
- General user guide
- Administration
- Server configuration
-
Server security and access configuration
- Authentication methods
- Access management
- Proxy configuration
-
Secret management
- Logs
-
Query manager
- Workspace location
- Command line parameters
-
Session manager
- Deployment options
- CloudBeaver Editions
- FAQ
- Development