When using a custom external IDM source, you may need to authenticate against that source
(For example, LDAP).
See Global security override for more information on how to use the users.txt file as an authentication mechanism.