Impact of Workspace Security Policies on Users
Understand how Invariant Technology's workspace security policies, such as login settings and collaborator permissions, affect user access and collaboration.
Understand how Invariant Technology's workspace security policies, such as login settings and collaborator permissions, affect user access and collaboration.
Understand the fundamental concepts of user identity and access within Invariant Technology, including managed users and external collaborators.
Explore how OpenID Connect (OIDC) enhances user authentication in Invariant Technology through Single Sign-On (SSO) and centralized identity management.
Explore how user invitations work in Invariant Technology, from initiation by an administrator to acceptance and account activation by the invited user.