+

Search Tips   |   Advanced Search

 

Implementing tokens for security attribute propagation

 

As part of an extensible architecture, WAS enables you to implement your own tokens in which to propagate security attributes.

 

Overview

The following topics are covered in this section:

 

Procedure



Implementing a custom propagation token

Implementing a custom authorization token

Implementing a custom single sign-on token

Implementing a custom authentication token

Propagating a custom Java serializable object

 

Related tasks


Developing extensions to the WebSphere security infrastructure