Establishing an authentication strength policy

This section consists of planning steps to be taken before specifying authentication strength settings in the WebSEAL configuration file.

Complete the following steps:

  1. Compile a list of protected objects for which access will be limited only to users who have successfully authenticated through a specific authentication method. For each protected object, specify the authentication method that applies.
  2. Compile a complete list of all authentication mechanisms that will be active (enabled) on the WebSEAL server system.
  3. Determine a hierarchy (ranking) for the active authentication mechanisms. Order the mechanisms from weakest to strongest.
  4. Determine if, during authentication strength level step-up, the user identity must be identical across the increased authentication level.
  5. Determine if any protected resources require access restriction based on the network address of the requesting client.
  6. Stop the WebSEAL server.

Parent topic: Authentication strength policy (step-up)