Establishing an authentication strength policy
This section consists of planning steps to be taken before specifying authentication strength settings in the WebSEAL configuration file.
Complete the following steps:
- Compile a list of protected objects for which access will be limited only to users who have successfully authenticated through a specific authentication method. For each protected object, specify the authentication method that applies.
- Compile a complete list of all authentication mechanisms that will be active (enabled) on the WebSEAL server system.
- Determine a hierarchy (ranking) for the active authentication mechanisms. Order the mechanisms from weakest to strongest.
- Determine if, during authentication strength level step-up, the user identity must be identical across the increased authentication level.
- Determine if any protected resources require access restriction based on the network address of the requesting client.
- Stop the WebSEAL server.
Parent topic: Authentication strength policy (step-up)