By default, the DualShield installer creates a default system administrator user called "sa". This is an internal user account managed by the DualShield server itself. You can create more internal user accounts for your admin or helpdesk team members who will be allowed to access the Admin Console, or you can allow your AD users to access the Admin Console.
To allow AD users to access the Admin Console, follow the steps below.
First, you need to add the AD domain into the realm called "Management Console"
select the domains to included or deselect the domains to be excluded in the realm
Finally, click Save to save the changes.
In the example below, the "Management Console" realm includes 2 domains, "deepnetmfa.com" and "Management Console"
"deepnetmfa.com" is an AD domain, which means that users in this domain are allowed to access the Admin Console.
Next, you need to assign an admin or helpdesk role to the users who will authorised to access the Admin Console.
First, find the user account in the user's directory
In the Domain list, select the domain that you want to work on, e.g. DeepnetMFA.com
If you click the "Search" button, it will list all users in the entire directory up to the query limit.
To narrow down your search, click the "Filter" button
Enter the user's login name, e.g. 2FA, then click the "Search" button (You can change the search filter or add more filters)
Click the context menu "..." of the user, e.g. Administrator
Select "Roles" from the context menu
Select the roles that you want to assign to the user, e.g. System Administrator
In the example below, a user called "John Smith" in an AD called "deepnetmfa,.com" is being assigned the "System Administrator" role
This means that the AD user "John Smith" will become a System Administrator of the Admin Console.