Identity as a Service applications are resources protected by IDaaS and that can only be accessed by successfully completing authentication challenges.
There are two types of applications that might be available to you. They are
Assigned Applications—Applications assigned to you by your administrator.
Available Unassigned Applications—Applications that have been set up by your Administrator, but that you cannot access. To gain access, ask your administrator to add you to a group that has access to the application.
Identity as a Service provides a layer of protection to prevent unwanted access to applications. For example, if you have a Salesforce account, with IDaaS integrated to protect your Salesforce account, you log in and authenticate to Salesforce through IDaaS. Sometimes your administrator might set up Identity as a Service to give you the option to use an Identity Provider to access your applications. In this case, you might see a button on your log in screen that allows you to access your application through the Identity Provider, for example, your Google account.
Logging in to your application may involve a one-step process called first-factor authentication (such as providing your user ID and password) or a two-step process called second-factor authentication that requires not only your user ID and password, but also a response to an authentication challenge. Additionally, sometimes you might simply be allowed to skip first factor and respond only to an authentication challenge. How you log in to your application depends on how your administrator has protected access to it though what is called a resource rule.
When you log in to some applications, you are prompted to confirm the continuation of your login session after a set period of time. The default session lifetime is one hour, which your administrator can change at any time. There is no session time limit when logging in to a Generic Radius Client.
You are logged out of Identity as a Service when your session lifetime expires, you explicitly log out, or your web browser session ends (typically when you close the browser).
Note: On MacOS, you must Quit the browser to terminate the session.
This section provides you with instructions to log in to applications. If you need help responding to an authentication challenge, see Using authenticators.
Topics in this section:
Log in to Identity as a Service and register your authenticators
Log in to Entrust Desktop for Windows from Identity as a Service
Log in to Microsoft Office 365 applications
Log in to OIDC and OAuth applications
Log in to OIDC and OAuth application using a URL
Log in to a SAML application using a web application URL
Log in to a SAML application from Identity as a Service
Log in using mutual authentication
Authentication to a RADIUS application or Entrust Identity Enterprise (formerly Entrust IdentityGuard) is performed on the application's user interface and not on Identity as a Service. You cannot click on the tab of a RADIUS or Entrust Identity Enterprise application shown on your My Applications page to log in.
Contact your administrator if you experience difficulty logging in to an application.