Shiny Server Pro: Authentication Examples

Follow

This article is adapted from the Shiny Server Administrator's Guide for version 1.4.2.


The authentication needs of your organization will determine the best configuration of Shiny Server Pro for you.  We hope the following links will provide enough information and examples to get you started successfully:

Simple stand-alone authentication

System-integrated authentication

Third-party authentication

 

Comments