This section is about authentication types and its different test methods.
Different Authentication Types | Check with BIP Admin user | Test with more client PCs |
To exclude user authentication corruption, test and compare the product behavior with different authentication type. | To exclude user security rights and authentication problems, test and compare the product behavior with BI administrator user rights and Enterprise authentication. | To exclude user profile corruption on a specific client machine, test and compare the product behavior on different client machines. |
Test with different user | ||
To exclude user profile corruption, test and compare the product behavior with different users |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
29 | |
21 | |
10 | |
7 | |
6 | |
6 | |
6 | |
5 | |
5 | |
4 |