User Authentication

Authentication identifies an individual. To gain access to restricted resources, a user must prove their identity, via passwords, credentials, or some other means (typically referred to as authentication tokens).

Authenticated users can submit requests on behalf of other users if they have the appropriate run_as privilege. For more information, see Submitting Requests on Behalf of Other Users.

You can use Shield’s native support for managing and authenticating users, or integrate with external user management systems such as LDAP and Active Directory. For information about managing native users, see Managing Native Users.