The access control is configured within the
access configuration key in the configuration file (
false): Whether to require authentication, see how to enable authentication.
false): Enable the guest mode.
Infinity): Seconds of inactivity after which a user is logged out.
true): Enable the creation, edition, and deletion of nodes and edges in all data-sources. Permissions can be fine-tuned for each group, see the documentation about users and groups. If set to
false, all edition requests sent through Linkurious to the data-sources will be rejected.
true): Enable to publish visualizations online. Published visualizations are always accessible by anonymous users.
externalUsersGroupMapping(optional): How to map external groups to Linkurious groups (see how to configure group mapping).
externalUsersAllowedGroups(optional): List of external groups of users allowed to log in into Linkurious.
externalUserDefaultGroupId(optional): Default group id automatically set for new external users when no other rule is set in
ldap(optional): The connection to the LDAP service (see how to configure LDAP).
msActiveDirectory(optional): The connection to the Microsoft Active Directory service (see how to configure Active Directory).
saml2(optional): The connection to a SAML2 identity provider (see how to configure SAML2 / ADFS).
Infinity): The maximum number of users that can connect to Linkurious at the same time.
To access Linkurious when
true, users need accounts in Linkurious.
Administrators can create accounts directly in Linkurious (see how to create users)
or rely on an external authentication service.
Linkurious supports the following external authentication services:
- Microsoft Active Directory
- Microsoft Azure Active Directory
- Google Suite
- OpenID Connect
- SAML2 / ADFS
If your company uses an authentication service that Linkurious does not support yet, please get in touch.
If you enable an SSO capable authentication service (OAuth/OpenID Connect or SAML2), your users won't need to login directly in Linkurious but, instead, by clicking the SSO button they will be redirected to the identity provider for authentication.