WAS v8.5 > Secure applicationsAuthenticate users
The process of authenticating users involves a user registry and an authentication mechanism. Optionally, we can define trust between WAS and a proxy server, configure single sign-on, and specify how to propagate security attributes between application servers. After completing the configuring the authentication process, authorize access to resources.
Subtopics
- Select a registry or repository
- Select an authentication mechanism
- Integrating third-party HTTP reverse proxy servers
- Single sign-on for authentication
- Implement single sign-on to minimize web user authentications
- Configure administrative authentication
- Java Authentication and Authorization Service
- Use the JAAS programming model for web authentication
- Performing identity mapping for authorization across servers in different realms
- Security attribute propagation
- Propagating security attributes among application servers
- Configure the authentication cache
- Configure CSIV2 inbound and outbound communication settings
- Authentication protocol for EJB security
- Use Microsoft Active Directory for authentication
- Configure a new JASPI authentication provider
- Select a registry or repository
- Select an authentication mechanism
- Integrating third-party HTTP reverse proxy servers
- Single sign-on for authentication
- Implement single sign-on to minimize web user authentications
- Configure administrative authentication
- Java Authentication and Authorization Service
- Use the JAAS programming model for web authentication
- Performing identity mapping for authorization across servers in different realms
- Security attribute propagation
- Propagating security attributes among application servers
- Configure the authentication cache
- Configure CSIV2 inbound and outbound communication settings
- Authentication protocol for EJB security
- Use Microsoft Active Directory for authentication
- SAML web single sign-on
- Trust associations
- Authorizing access to resources