Operating Systems: i5/OS
Personalize the table of contents and search results
Authenticating users
The process of authenticating users involves a user registry and
an authentication mechanism. Optionally, you can define trust between WebSphere
Application Server and a proxy server, configure single sign-on capability,
and specify how to propagate security attributes between application servers.
Overview
The following security topics are covered in this section:
- User registries
-
For information on local operating system, Lightweight
Directory Access Protocol (LDAP), custom user registries, and user repositories
such as virtual member manager, see User
registries and repositories.
- Trust associations
-
For more information on trust associations, see Trust associations.
- Single sign-on
-
For more information on single sign-on, see Single sign-on.
- Security attribute propagation
-
For more information on propagation tokens, authorization tokens, single
sign-on tokens, and authentication tokens, see Security attribute propagation.
The following information is covered in this section:
Procedure
What to do next
After completing the configuring the authentication process, you
must authorize access to resources. For more information, see Authorizing access to resources.
}
Selecting
a registry or repository
Authentication mechanisms
Configuring the Lightweight Third Party Authentication mechanism
Integrating third-party HTTP reverse proxy servers
Implementing single sign-on to minimize Web user authentications
Propagating security attributes among application servers
Configuring the authentication cache
Configuring IIOP authentication
Configuring Common Secure Interoperability V2 (CSIV2) and Security
Authentication Service (SAS)
Java Authentication and Authorization Service
Using the Java Authentication and Authorization Service programming
model for Web authentication
Related tasks
Authorizing access to resources
|