Authentication Types and Account Management

Modified on Tue, 24 Mar at 12:42 PM

There are various types of authentication available for accessing SEQTA. We always recommend that the highest level of security is applied to authentication in order to preserve the confidentiality of information. For this reason, we recommend that SAML Authentication is applied with multi-factor authentication enforced from your identity provider.

Authentication types are setup and configured during implementation, but can be changed later if required.

More than one type of authentication can be enabled for each of the SEQTA products (i.e. SEQTA Teach, SEQTA Engage).

SAML Authentication (recommended):

  • The user requires a corresponding account in their identity provider (i.e. Azure AD, Google, OneLogin).
  • If required, the login page may redirect to the identity provider to authenticate.
  • If using Google, the user's Google email address is stored in the user record in SEQTA.
  • If using Google, then the password field in the user record in SEQTA needs to be blank.
  • Mobile apps SEQTA Learn and SEQTA Engage may still use internal authentication (not recommended). These should be protected by biometric authentication.

Internal Authentication (supported but not recommended): Internal authentication refers to SEQTA's built-in authentication.

  • The username and password are both stored in the user record in SEQTA. The forgot password link only works for Internal authentication for accounts with an email address associated.

Active Directory Authentication/LDAP (supported but not recommended): Active directory is an external system which some schools use to manage authentication. 

  • The username is stored in the user record in SEQTA. This needs to match the username for the person in Active Directory.
  • The password field in the user record in SEQTA needs to be blank.
  • The user requires to have a corresponding account in Active Directory.
  • The user record may need to be in a specific group in Active Directory.

To learn how to enable MFA in Azure/Entra and Google Workspace, please see the following articles:

Enable Microsoft Entra multifactor authentication - Microsoft Entra ID | Microsoft Learn

Deploy 2-Step Verification - Google Workspace Admin Help

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article