Authenticating users

The process of authenticating users involves a user registry and an authentication mechanism. Optionally, we can define trust between WAS and a proxy server, configure single sign-on capability, and specify how to propagate security attributes between application servers.

 

About this task

The following security topics are covered in this section:

User registries

For information on local operating system, Lightweight Directory Access Protocol (LDAP), and custom user registries, see User registries .

Authentication protocol for EJB security

For more information on the authentication protocols that are used for EJB security, see Authentication protocol for EJB security .

Trust associations

For more information on trust associations, see Trust associations .

Single sign-on

For more information on single sign-on, see Single sign-on .

Security attribute propagation

For more information on propagation tokens, authorization tokens, single sign-on tokens, and authentication tokens, see Security attribute propagation .

The following information is covered in this section:

 

Procedure

 

What to do next

After completing the configuring the authentication process, you must authorize access to resources. For more information, see Authorizing access to resources .

 

See also


Select a user registry
Authentication mechanisms
Authentication protocol for EJB security
Select an authentication mechanism
Integrating third-party HTTP reverse proxy servers
Implementing single sign-on to minimize Web user authentications
Propagating security attributes among application servers
Configuring the authentication cache
Configuring IIOP authentication
Configuring RMI over IIOP
Java Authentication and Authorization Service
Using the Java Authentication and Authorization Service programming model for Web authentication
Related tasks
Authorizing access to resources