Home > Storage > ObjectScale and ECS > Product Documentation > ECS: Overview and Architecture > Authentication
ECS supports Active Directory, LDAP, Keystone, and IAM authentication methods to provide access to manage and configure ECS; however, limitations exist as shown in the following table. For more information about security, see the latest ECS Security Configuration Guide.
Authentication method | Supported |
Active Directory |
|
LDAP |
|
Keystone |
|
IAM |
|