# ADFS SAML (RUX)

{% hint style="warning" %}
**Please Note:**

This article is **ONLY** for customers configuring SAML SSO for **Respond UX (RUX)** deployments using **ADFS as the IdP**.

If you are configuring ADFS SAML for the Quadrant UX, please see [ADFS SAML (QUX)](https://docs.vectra.ai/configuration/access/saml-sso-qux/adfs-saml-qux) instead of this article.

While similar, there are some differences in the implementation for customers using the Quadrant UX. If you are unsure which UX you are using, please see: [Vectra Analyst User Experiences (Respond vs Quadrant) for more information](https://docs.vectra.ai/deployment/getting-started/analyst-ux-options-rux-vs-qux).

The Respond UX requires different SAML claim names than the Quadrant UX when setting up SAML 2.0 based SSO but the claim creation process in the IdP is similar.
{% endhint %}

## Introduction

* Customers can setup SSO federation to multiple SAML 2.0-based identity providers (IdP).
  * For most customers, only a single IdP is required.
* Once federated, already authenticated users will have one-click login in to the Vectra Respond UX.
  * If multiple IdPs are configured, and the user is not already authenticated, the user will need to enter their email address so the domain name mapping can direct the user to the appropriate IdP.
* Features like password policies and multi-factor authentication will be enforced by the IdP.
* Once authenticated, users are assigned the Vectra role defined for their user or group in the IdP.
  * This will map to a role (and permissions) as defined in the Vectra UI.

## Multiple SAML Profile Support

Vectra now supports multiple SAML profiles. Not all customers will require this, and NO changes are required for existing single IdP SAML configurations.

{% hint style="info" %}
**Please Note:**

* Existing customers do **NOT** need to do anything if they will continue to only have a single SAML IdP configured.
* Any new profile that is added, for new or existing customers, will now need to have a **Domains** list configured as part of the Vectra SAML profile.
* If you add a 2nd profile to an existing deployment that did **NOT** have a **Domains** list configured previously, you **MUST** edit that existing profile to add the **Domains** mapping for that IdP.
* Nothing changes on the IdP side of the configuration.
* When multiple profiles are configured, users will be asked to enter their email address to be redirected to the appropriate IdP when they click **Login with SSO** on the Vectra login screen.
  {% endhint %}

## RUX SAML SSO - Notes of Interest

* **Please ensure the users are only mapped to one Vectra Role in the IdP.**
  * At this time, if a user is mapped to more than 1 role in the IdP, the user may not successfully log in with the desired role.
* IdP initiated flows are **NOT** supported.
  * While these flows may work, they are not recommended because they are highly susceptible to Man-in-the-Middle attack using stolen SAML assertions.
* Single Log Out (SLO) and IdP initiated log out are **NOT** supported.
  * When a user logs out of the Respond UX, they are taken to a screen where they can log in locally or click a link to **Log in via SSO**.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-c3455be19ad71725ab7b0cc0ea47b1f5fa2e064b%2F9c010e9fe101f9505d65aab3753357ab97072add384f3569620b994f0db96d9c.jpg?alt=media" alt="" width="280"><figcaption></figcaption></figure>

* At this time, a user who successfully authenticates through their IdP to Vectra will have a session that is good for one day.
* Local user login that bypasses the SAML flow is still available by adding `/signIn?local=True` to the end of your Respond UX login URL.
  * Example: `https://[unique_customer_id].uw2.portal.vectra.ai/signIn?local=True`
  * If you are publishing the URLs of applications used in your environment on a dedicated app/page, you can publish the URL associated with the **Login with SSO** link  to ensure users always use this path
* Token Encryption is currently **NOT** supported.

## SAML Service Provider (SP) Initiated Flow

* Please note that all communication that is associated with the SAML login process is brokered by the User Agent (user's browser). Vectra never needs to communicate with the IdP during authentication.
  * Vectra does communicate with the IdP to retrieve the required federation metadata during configuration and refreshes that metadata periodically to ensure new certificates are ingested from the IdP when expiration is near.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-4bb798590cd691951628fbcfa24364f750b7dcea%2F9129a06ce6b836c04564835ddc7329213a224b3a6a9deccd9391485d866bc31d.jpg?alt=media)

## Prerequisites

* Vectra tested using Microsoft ADFS server version 10.
  * *Note: SSO may also work on lower versions of Microsoft ADFS supporting SAML 2.0 (i.e. from version ADFS 2.0), but this was not tested by Vectra and is not supported.*
* Verify the version of your Microsoft ADFS server. The `CurrentFarmBehavior` value must be 3 or 4.

  * To do so, you can run PowerShell command to get ADFS version: `Get-AdfsFarmInformation`&#x20;

  <figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-901f1b7de952b8150289dd9062f2fd5656d91239%2Ffa34cbca4c6cd80d2733c061d61d6bf96a9102af9b6b5d0833f4ef690af58fdd.jpg?alt=media" alt="" width="563"><figcaption></figcaption></figure>
* SSL - Vectra Respond UX requires that the SSL Certificate of the ADFS server be publicly signed to allow for certificate validation.

## Configuring ADFS for Vectra RUX

### 1. Create Vectra SAML Profile

* First we'll need to start creating the SAML Authentication Profile in the Vectra UI.
  * Additional profiles can be configured if multiple IdPs are required for your deployment.
* Open a new browser tab and log in as you normally do and navigate to *Configuration → ACCESS → External Authentication*.
* Click on **Create** in the SAML Profiles section.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-43357412e28cf8704fae2292b03da1ee7ad5b647%2F1ecd116c338ba827be231f1829297c33284da3525079c6690e96d32480c23877.jpg?alt=media)

* A dialog will open and the **SP ACS URL** and **SP Entity Provider** will be displayed there for entry into the corresponding fields in the IdP. Make note of these values for later use with your IdP.
  * The SP is the Service Provider (Vectra SaaS)
* Leave this tab in your browser open and proceed in another tab or window to your IdP configuration so that you can retrieve the IdP Metadata URL needed to complete the Vectra SaaS configuration.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-1321331baa6672002dbfb022a84837eab6629a6d%2Ff6d622b1e00525df8b1ba22e04be492b0e6e818821aeb2832bc99f54d7ee6e53.jpg?alt=media)

* The **SP ACS URL** is the Assertion Consumer Service URL. It represents the endpoint on the service provider (Vectra side) where ADFS will redirect to with its authentication response.\
  This URL will be of the following format: *`https://<Brain URL and AWS Region>.amazoncognito.com/saml2/idpresponse`*.
* The **SP Entity Provider** represents the entity of the Vectra Service Provider.
* Click **Next**. Take note of these information as they will be needed in the next steps to configure the corresponding fields in the **ADFS SAML SSO** setup flow.
* Note: If you want a hostname-based entry instead of IP-based entry for the **SP ACS URL** and **SP Entity Provider**, then you should:
  * Configure in Vectra the Brain FQDN, in *Configuration → COVERAGE → Data Sources → Network → Brain Setup → Brain → DNS Name.*
  * Check the **DNS Name** radio button for the **For linking in alerts/notifications (except AWS SecurityHub)** section.
  * This will populate the SP entries using hostname instead of IP.

{% hint style="info" %}
**Please Note:**

The **DNS Name** should be in lowercase in this area and any place you see it in ADFS.
{% endhint %}

* Next, we will configure ADFS with these values.

### 2. Add a Relying Party Trust in ADFS

Relying party trust is a term used in ADFS to identify service providers (in our case Vectra) that can communicate with an ADFS endpoint.

* Go to **AD FS Management**, select in the left navigation pane **Relying Party Trust**, then on the right navigation pane click **Add Relying Party Trust.**

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-3207441761aa5c4d0b82addb0348901670626122%2F4f264effbe60958ba41711639e70337584584410717180c9cf0fc56180f5fa4e.jpg?alt=media)

* On the Wizard **Welcome page**, select the option **Claims Aware**, then click **Start.**

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-5f2a0d4fdcd83a40a63b530b29c6053c40e1703a%2F2358ee47e258e6bade6b2b6ca99627f176fdaa1ad19ceb0f5d3a3b89395efae8.jpg?alt=media)

* Select **Enter data about the relying party manually**, then click **Next.**

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-bbd8d987af163ba3d71cda9b13d4b5f3f65d376b%2Fea870e362d0d4fd7365307c05e3fdf95837925e4830b6b7f47e74e7bbde76b67.jpg?alt=media)

* Enter a display name (like **Vectra Respond UX** and any optional notes, then click **Next**

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-9d163c9a97f9b34727929d88b000520fbd958aad%2F4684f7bed9f52421d4ca22c51e4758c878560aa047f53468b7ecce4c6280d845.jpg?alt=media)

* Click **Next** to accept the defaults for the **Configure Certificate** step.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-19637bf9986b6dc94ca42c7d27e09fde7a62006d%2Fe8d11dd685bf21cb307a0ae40f4aff782146a71b087be810bc85f642d59e71a7.jpg?alt=media)

* Select **Enable support for the SAML 2.0 WebSSO Protocol**.
* Enter the **SP ACS URL** retrieved from Vecgra SAML Profile configuration page in [Step 1](#id-1.-get-saml-profile-information-for-adfs), then click **Next**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-872af3229d7399f1e5417052e4f8be41ebbe4754%2F52ab9b0beaea3777317176784befa5d3b31965cc0c9f3cd164cb6c6f9bef443c.jpg?alt=media)

* In the **Relying party trust identifier**, enter the **SP Entity Provider** retrieved from the Vectra SAML profile configuration page in [Step 1](#id-1.-get-saml-profile-information-for-adfs). Click **Add**, then Click **Next**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-6bb01724a609d55fbff3636c92e368ec6978f452%2F90aa97a5db3f88de853be92fa400321d46c8838b94558c18f6daa654333e1a90.jpg?alt=media)

* Select **Permit Everyone** (or other access control policy of your choice), then click **Next**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-b037bf825a06366be0b8babfd38cf8048216b09b%2Fa74ce29ae0d8e6c985c9f265528fbb5cb2fec512998d023c9f8b60eb7648886e.jpg?alt=media)

* No changes are needed for the **Ready to Add Trust** section. Click **Next**.
* At the Finish screen, uncheck **Configure claims issuance policy for this application,** then click **Close**.
* Next, we will configure custom attributes to use as a claims.

### 3. Add a Claim Description in ADFS

Claim descriptions will allow us to create a custom attribute that will be sent by ADFS in its SAML response. In our case, we need to create attributes corresponding to standardized name of a Vectra role, email address, and name, so that Vectra can then give the right permissions associated to the role indicated in the SAML response. Thus, once authenticated, users are assigned by Vectra the application role defined in the ADFS.

* Go to **AD FS Management**, select **Service** from the left navigation pane then **Claim Descriptions**.
* Click **Add Claim Description...** on the right navigation pane and add new claims for `role`, `emailaddress`, and `name`.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-0d3a7a1a4f2ee1b22ab2f436f40ac5ae48d2ac9b%2F580715a4c31354e703332234c64d51bcba649ba9971145c20a29e6b1e1ec6c71.jpg?alt=media)

* Enter a **Display name** like `Vectra Role`.
* Enter the **Short Name** `user.assignedrole`.
* Enter the **Claim Type** `role`.
* Finally leave the two **Publish**… boxes unchecked and finish by clicking **Ok**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-38191d785347b0e0e863d7c51adec4524693a711%2F7c54f37243b07d88319f81345186cb5e456e8956511f692e08edc7d505d0f7ee.jpg?alt=media)

* Enter a **Display name** like `Vectra Email`.
* Enter the **Short Name** *`user.email`*.
* Enter the **Claim Type** *`emailaddress`*.
* Finally leave the two **Publish**… boxes unchecked and finish by clicking **Ok**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-85b73ed63d36a38665d757d47a9e7929aea32cac%2F10b49b85b2f5c8c7fdedda8df19038c9731eba97caf86fb2ddf4aa5aa878e9aa.jpg?alt=media)

* Enter a **Display name** like *`Vectra Name`*.
* Enter the **Short Name** *`user.name`*.
* Enter the **Claim Type** *`name`*.
* Finally leave the two **Publish**… box unchecked and finish by clicking **Ok**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-3361b21765920db98f15d2d0e0a343409db3d762%2Ffe31e4a1694100216f09012a32ae831fd75cf2978e5c18fc8bda8f3224752f2a.jpg?alt=media)

### 4. Add Rules Claim in ADFS

In ADFS, the Claims Issuance Policy defines what pieces of information about a user go where in a claim.

* To define it, go to **AD FS Management**, select **Relying Party Trusts** from the left navigation pane then **Edit Claim Issuance Policy…** from right navigation pane.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-771e5c5bfd18417ab555bc381fd42041f610a874%2F65416058ee7dd44b649cdb561c2ac1a54d6acd0c2220a69401c18b4745071d84.jpg?alt=media" alt=""><figcaption></figcaption></figure>

#### 4a. Add the SSO rule Claim

* Select **Send LDAP Attributes as a Claim**, then click **Next**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-ae0eaab61719a3a38b1f550c1662f97b52491c66%2F835660b9c334ef24f8414a1e5f612e8ec41eb36c5196d0472e0bfd9b7a0b3b07.jpg?alt=media)

* Enter a **Claim rule name** like `Vectra Respond UX`***.***
* Then select **Active Directory** for **Attribute Store.**
* Then select **User-Principal-Name** as **LDAP Attribute** and map it to `Name ID` as **Outgoing Claim Type.**
* Then select ***User-Principal-Name*** as **LDAP Attribute** and map it to `Vectra Email` as **Outgoing Claim Type.**
* Then select **Display-Name** as **LDAP Attribute** and map it to `Vectra Name` as **Outgoing Claim Type.**

{% hint style="info" %}
**Please Note:**

The **User-Principal-Name** contains the value of the email address of the user.

* The **Name ID** outgoing claim should always be present to ensure correct session handling and can be seen as the login field in SAML.
  {% endhint %}

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-a5759e7f9777fb1df6568ee16f0283fbcb3ca086%2F35907c9fabf2caadb517fd364cb3769970a0d3a34c4a19b418061588690d5672.jpg?alt=media)

#### 4b. Add Role rule Claim

* Now, go to Edit Claim Issuance Policy window to create a second claim rule, which will map the AD group to the standardized Vectra role name. This will map to a role (and permissions) defined in Vectra.
* Add a new rule Claim **Add Rule…**

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-5a589fca9e7cb7f9e4e5755c31ac26a7b3d44d05%2F6c9d6dfcf3aec1b7da870d88cb0e90ef316692a821cc6fb4e8c8a8de24fab948.jpg?alt=media)

* Select **Send Group Membership as a Claim**, then click **Next**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-a651e340f436ccb23da300fd7bdae640e2f56279%2Fc8fbaf08952dc296692a1d3ad1c359eb5566b8f3ed4217ee5daddf7455775c8b.jpg?alt=media)

* Enter a **Claim rule name**.
* Browse the Active Directory and select the group to map
* Select the **Outgoing claim type** newly created **Vectra Role** in our example.
* Then, we need to indicate the **Outgoing claim value** which will be the standardized name of your role to be assigned.
  * To find this value, go back in your Vectra tab, navigate to the *Configuration → ACCESS → Roles* screen.
* Click on each role that your SAML users will be using and make note of the specific **Standardized Name** for each role.
  * For example, the Security Analyst role has a Standardized name of `security_analyst` .

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-04b0f70801e45aa239c40ad77b9abdbd71b63d5f%2F1ad23c0d6f4d5a03014ffc056324ba0ede55cb336862c9881483f28f07883973.jpg?alt=media)

* Enter the specific **Standardized Vectra Role Name** to map then click **Finish**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-731061b492c813e0b0a8678cf9faae41d7ffef85%2Fc8fa915035485d3bbe5dce1156507d92c6ef3e23d08862e09430b0044bd3b143.jpg?alt=media)

{% hint style="info" %}
**Please Note:**

For each role assignment a rule needs to be created.
{% endhint %}

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-abce5c7b460af0b5cba789329a53db705ddea727%2Fff6bc8612258ae1ff4df3bbf1db374c2e79ceb7b7fb66249a19f0403f4b0e18a.jpg?alt=media)

{% hint style="info" %}
**Please Note:**

Ensure the users are only mapped to one Vectra Role in the IdP. If a user is mapped to more than 1 role, the user may not be assigned the preferred role.
{% endhint %}

### 5. Finish SAML Profile in Vectra

* After ADFS configuration and copying the IdP Metadata URL you can complete the configuration back in the Respond UX.
* Switch back to the browser tab or window with your Respond UX.
* Paste the IdP Metadata URL into the **Create SAML Profile** dialog box.
* Fill in the **Profile Name** with a name of your choice.
* Fill in the **Domains** field with the domains that should map to the SAML IdP you are configuring.
  * When multiple SAML profiles are configured, users will enter an email address after clicking **Login with SSO**.
  * Based on the user input and mapped domains, the user will be redirected to the appropriate IdP for authentication and then redirected back to Vectra with a SAML assertion.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-91025e357545dc50b293680fcc47e9697459bfe9%2Fb99afff86fe321204b5829ce73af3161b73aaecea97a30ab8fe3317f9e620457.jpg?alt=media)

* Click **Create**.
* Your SAML profile is now complete and will show in the Respond UX. Clicking on it will show the details similar to the below (this will vary by vendor and details provided).

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-ecdc5ea33478f6f211b2e0e84238482387b35af1%2Fdc24ad6bd38e9846daa59b29dfffb13112a933afc23659d977e2d6185ae6124d.jpg?alt=media)

* As you can see above, the Profile Name and Domains list can be edited for profiles that have already been configured.
  * You can click the **View** link on a profile in the SAML Profiles list in your UI to get back to this screen.

### 6. Test your new SAML Single Sign-On Functionality

* Once configuration is complete on both the Service Provider (Vectra) and IdP side, you are ready to test SAML SSO to Vectra.
* Keep in mind that only users and groups who are mapped to standardized Vectra role names in your IdP will succeed.
* Click the **Login with SSO** button on the login page for your Vectra SaaS tenant.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-9c58aa8dfa48605314bb068cc801b0ae239d6ea4%2Ffb5f81e774c9e87d6f8e412713eca2d70318ce031414de861f82deb6309ec7d2.jpg?alt=media)

* If you are already authenticated to your IdP, and have a mapping to a standardized role that exists in Vectra, you should be logged in without requiring any additional steps.
* If you are need to authenticate to your IdP, you will be asked for a email address when multiple profiles are configured and redirected to your IdP for authentication and then redirected back to Vectra and presented the UI mapped role permissions applied.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-4640c6d79a875d69eb1ff1761b76e16ae9c2e0cf%2Ff32cb041d5facb5b0efa1f06d47ef390a0019f8a323ed262038fa2cc053a36b8.jpg?alt=media)

* ADFS login page:

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-e6b7aee0d31ceded225531cc7fed23168f9d5b0c%2Fde50280972f6e8cf1dc524e9796209afef8344417ee55a8c27e15d18c9730189.jpg?alt=media)

* Note: local authentication can be performed using URL *`https://<Vectra_Respond_UX_URL/signIn?local=True`*
