Authentication
Authentication is the first step a user takes when making a request for a resource protected by ISAM. During authentication, a user identity is validated.
The authentication process depends on the specific requirements of the service-providing application. Security Verify Access allows a flexible approach to authentication through the use of the authorization API.
ISAM provides built-in support of user name and password authentication through the authorization API. Applications can build any custom authentication mechanism that uses the authorization API.
Parent topic: Core technologies