Network Deployment (Distributed operating systems), v8.0 > Secure applications and their environment


Authenticate users

The process of authenticating users involves a user registry and an authentication mechanism. Optionally, you can define trust between WAS and a proxy server, configure single sign-on capability, and specify how to propagate security attributes between application servers.


Procedure

  1. Select a registry or repository
  2. Trust associations
  3. Single sign-on
  4. Security attribute propagation
  5. Configure WebSEAL or a custom trust association interceptor.
  6. Implement single sign-on to minimize web user authentications.
  7. Propagate security attributes among application servers.
  8. Configure the authentication cache.


What to do next

After completing the configuring the authentication process, authorize access to resources. See Authorizing access to resources.


Related


Select a registry or repository
Select an authentication mechanism
Integrate third-party HTTP reverse proxy servers
Single sign-on for authentication
Implement single sign-on to minimize web user authentications
Configure administrative authentication
Job manager security
JAAS
Use the JAAS programming model for web authentication
Performing identity mapping for authorization across servers in different realms
Security attribute propagation
Propagate security attributes among application servers
Configure the authentication cache
Configure CSIV2 inbound and outbound communication settings
Authentication protocol for EJB security
Use Microsoft Active Directory for authentication
Configure a new JASPI authentication provider
Trust associations
Authorizing access to resources

+

Search Tips   |   Advanced Search