Implementing tokens for security attribute propagation
As part of an extensible architecture, WAS enables you to implement your own tokens in which to propagate security attributes.
Overview
The following topics are covered in this section:
Procedure
- Implementing a custom propagation token
- Implementing a custom authorization token
- Implementing a custom a single sign-on token
- Implementing a custom authentication token
- Propagating a custom Java serializable object
Implementing a custom propagation token
Implementing a custom authorization token
Implementing a custom single sign-on token
Implementing a custom authentication token
Propagating a custom Java serializable object
Related tasks
Developing extensions to the WebSphere security infrastructure