LogoLogo
Cymmetri
Cymmetri
  • Getting Started
    • What is Cymmetri?
    • Release Notes
      • 3.0.1-Beta
      • 3.0.2-Beta
      • 3.0.3-Beta
      • 3.0.4-Beta
      • 3.0.5-Beta
      • 3.0.6-Beta
      • 3.0.7-Beta
      • 3.0.8-Beta
      • 3.0.9-Beta
      • 3.0.10-Beta
      • 3.0.11-Beta
      • 3.0.12-Beta
      • 3.1.0 - Product Release
      • 3.1.1-Beta
      • 3.1.2 - Product Release
      • 3.1.3-Beta
      • 3.1.4-Beta
      • 3.1.5-Beta
      • 3.1.6 -Beta
      • 3.1.7 - Product Release
      • 3.0.x Consolidated
      • 3.1.x Consolidated
    • Starting your Cymmetri Trial
    • Admin Dashboard
    • Accessing Cymmetri
    • Supported Web Browsers
    • Cymmetri Error Codes
    • Help
    • Personalization
      • General Config
      • Admins
      • Masters in Cymmetri
      • Personalize Notification Templates
      • Tenant Branding
      • Custom Attributes
      • API Client
      • Batch Tasks
      • API Extension
    • Global Search
  • Identity Hub
    • Managing Users and Groups
      • User Management
      • User Detail
      • Create Users
      • Edit Users
      • Create Groups
      • Importing Users
      • Assigning Users to Groups
      • Delegation
        • Setting up Delegation
        • Delegating Work to Delegatee
        • Accepting Delegation
      • Suspended Users
      • Archived Users
      • All Users Session
    • Authentication
      • Identity Provider
        • Internal IDP
          • Introduction
          • Internal Identity Provider Configuration: Cymmetri
          • Internal Identity Provider Configuration: Active Directory
          • Internal Identity Provider Configuration: LDAP
        • External IDP
          • Introduction
          • External Identity Provider Configuration - Google IDP
          • External Identity Provider Configuration - Azure IDP
          • External Identity Provider Configuration - Salesforce IDP
      • Service Provider
      • Authentication Rules
      • Password Policy
      • Global Auth Policy
      • Adaptive
    • Attribute Setting
    • Password Filter
    • Logs
      • Audit Log
      • Import History
      • Scheduler History
  • Lifecycle Management
    • Application Management
      • Support for Application Management
      • Getting Started
        • Introduction to Application Management
        • Adding Applications to be managed by Cymmetri
        • Assigning Applications to End Users
        • Application Detail
        • Dynamic Forms
        • Configuring Connector Server
        • 360 Degree Recon
      • Provisioning How to
        • Cymmetri Connector List
        • Supported Provisioning Operations
        • Azure Provisioning
        • Active Directory (AD) Provisioning
        • Google Workspace Provisioning
        • LDAP Provisioning
        • Powershell Provisioning
        • REST Connector Provisioning
        • SCIM v2.0 Provisioning with Basic Authentication
        • SCIM 2.0 with Bearer Authentication
        • SCIM 2.0 with Fixed Bearer
        • Github Provisioning
        • ServiceNow Provisioning
        • AMAYA
        • HRMS
          • Darwin Box
        • Database Provisioning
        • CSV Directory (Flat-file)
        • Managing Manual Application Assignments
        • SOAP Connector (XML)
        • Integration with Service Desk Management Systems
      • Reconciliation How to
        • Configuring Reconciliation Process
      • Rules
        • Provisioning
        • Deprovisioning
    • Workflow Management
      • Workflow Configuration
      • Workflow Rules
      • Pending Workflows
      • Workflows List
    • Teams Config
    • Configuring Webhooks
    • On Demand Access
  • Single Sign On
    • Introduction
    • SSO Configuration
      • SAML 2.0 Based SSO
      • API Based SSO
      • OpenID Connect Based SSO
    • Multifactor Authentication(MFA)
      • Introduction
      • Cymmetri Authenticator
      • Push Authenticator
      • Google Authenticator
      • SMS Authenticator
      • Secret Questions
      • FIDO Authenticator
      • Admin MFA Setting
    • Passwordless
      • Introduction
      • TOTP Based
      • OTP Based
      • Consent Based
      • FIDO Based
  • My Workspace
    • Getting Started
      • Introduction
      • First Time User Registration
      • End User Login Process
      • Forgot Password & Unlock Account
      • User Settings
    • How to use the My Workspace
      • Dashboard
      • My Access
      • Inbox
      • Team
      • On Behalf
  • Privileged Access Management
    • PAM Administration
      • Introduction to Privilege Access Management (PAM)
      • How to Access PAM in Cymmetri
      • Sub-Sections of PAM
      • Steps to configure PAM Server
      • Adding a device/ server in PAM
      • Vault User
      • Vaulting Configuration
      • Break Glass Configuration
      • PAM Reports and PAM History
      • Dormancy Disable Config
    • PAM Usage
      • Assign a server to a user
      • Access the server
  • Governance
    • Compliance Management
      • IGA Policy Violations
    • Insights
      • Reports
      • Risk
      • Management Dashboards
        • CISO Dashboard
        • CRO Dashboard
      • Industry Compliance
    • Access Certification
      • Setting up and managing Access Reviews
    • Recommendation Engine
    • Role Management
      • Role Mining
      • Entitlements
      • Managing Roles in Cymmetri
    • Segregation Of Duties (SOD)
  • Self-Service App
  • Analytics
    • Cymmetri Analytics
Powered by GitBook

Cymmetri.com

On this page
  • Password-based Authentication:
  • Passwordless Authentication:

Was this helpful?

Export as PDF
  1. My Workspace
  2. Getting Started

End User Login Process

Last updated 9 months ago

Was this helpful?

The End User Login Process commences when a user accesses their designated tenant instance login page, which typically conforms to the structure: https://<company-name>.cymmetri.io

Once, on the Cymmetri Login page, the user needs to enter their username, users receive their login credentials on their corporate email as shown below:

If the administrator has enabled password-less login option, then the user sees the Login without Password button, else the user sees only the Login button.

The user has the flexibility to select either a password-based authentication or a passwordless authentication mechanism during the login process.

Password-based Authentication:

The steps below indicate the password-based authentication mechanism:

Once the username is entered and the user clicks on Next, the user then needs to enter the password received on their email, and click on the Login button.

Depending on whether the administrator has enabled the multi-factor authentication options for the organization, and depending on the factors that the user has registered , the user is shown the various multi-factor authentication options.

Option 1 - Choosing Cymmetri Authenticator will require the user to enter their Time-based OTP as it appears on your Cymmetri Authenticator mobile application. The user needs to enter the TOTP and click on Verify to continue.

Option 2 - Choosing Push Authenticator will send a push notification to the user's mobile phone and the user may click on the accept button to complete the login process.

Option 3 - Choosing Google Authenticator will require the user to enter their Time-based OTP as it appears on their Google Authenticator mobile application. The user needs to enter the TOTP and click on Verify to continue.

Option 4 - Choosing SMS Authenticator will send an OTP to the user's registered mobile number and the user is expected to enter this OTP and Click on Verify to continue.

Option 5 - Choosing Secret Questions Authenticator will ask the user to answer a certain number of questions as selected by the user and once answered the user may Click on Next to continue.

Regardless of the flow followed and the multi-factor authentication option chosen, the user will end up on the dashboard page below upon successful login.

Passwordless Authentication:

The steps below indicate the passwordless authentication mechanism:

  1. To begin the Passwordless Login flow the user needs to click on the "Login without Password" button, this will trigger the password-less login flow, will show the various registered passwordless login options.

Option 1 - Choosing TOTP Based Passwordless Login mechanism will require the user to enter their Time-based OTP as it appears on your Cymmetri Authenticator mobile application. The user needs to enter the TOTP and click on Verify to continue.

Option 2 - Choosing OTP Based PasswordlessLogin mechanism will send an OTP to the user's registered mobile number and the user is expected to enter this OTP and Click on Verify to continue.

Option 3 - Choosing the Consent Based Passwordless Login mechanism will send a push notification to the user's mobile phone and the user may click on the accept button to complete the login process.

Regardless of the passwordless mechanism chosen to login , the user will end up on the dashboard page below upon successful login.