Overview
The AMP is designed to work with the existing ACM security model. Users must login and authenticate through ACM. Once authenticated, AMP creates a session for the user and authorizes access to application pages. Users can be configured as administrators, which allows administrative page access during the session. The credentials used to authenticate and authorize with ACM are encrypted during session usage with ACM WCF services. ACM Users and Roles are enforced per task, such as execution of device commands or changing supported device configuration properties.
...
The username entered must not be in a Locked out state.
The AMP license licensed devices number has not been exceeded.
The domain/username/password is a valid network or domain account.
ACM Security Enabled
When enabled, authentication is dependent on the User Mobile Access setting in the ACM configuration. The domain/username entered on the Login page must match a User in ACM by username or by group membership. Command execution and device property changes will have Role configuration enforced.
...
The username entered must not be in a Locked out state.
The AMP license licensed devices number has not been exceeded.
The domain/username/password is a valid network or domain account.
The domain/username must match a User in ACM by username or by group membership.
The User configuration in ACM must have Mobile Access enabled.
Sessions
Once a user is authenticated via Login and the ACM Security security process is completed (described above), a session is created and the user is redirected to the Dashboard. The session length is determined by the Session Length property on the Server administration page. Once a session has expired, the user is returned to the Login page. A user may perform a manual logout by clicking the Logout icon on the application toolbar. See Application Toolbar for details on its usage.
...