Network Deployment (Distributed operating systems), v8.0 > Secure applications and their environment > Authenticate users > Use the JAAS programming model for web authentication


Develop custom login modules for a system login configuration for JAAS

For WAS, multiple Java Authentication and Authorization Service (JAAS) plug-in points exist for configuring system logins. WAS uses system login configurations to authenticate incoming requests, outgoing requests, and internal server logins.

Application login configurations are called by Java EE applications for obtaining a Subject that is based on specific authentication information. This login configuration enables the application to associate the Subject with a specific protected remote action. The Subject is picked up on the outbound request processing. The following list identifies the main system plug-in points. If you write a login module that adds information to the Subject of a system login, these are the main login configurations to plug in:


Procedure


Security attribute propagation
Configure inbound identity mapping
Customize a server-side JAAS authentication and login configuration
Configure outbound identity mapping to a different target realm
Use the JAAS programming model for web authentication


Related


System login configuration entry settings for JAAS

+

Search Tips   |   Advanced Search