Authentication

Authentication is the first step a user takes when making a request for a resource protected by ISAM. During authentication, a user identity is validated.

The authentication process depends on the specific requirements of the service-providing application. Security Verify Access allows a flexible approach to authentication through the use of the authorization API.

ISAM provides built-in support of user name and password authentication through the authorization API. Applications can build any custom authentication mechanism that uses the authorization API.

Parent topic: Core technologies