The process of authenticating users involves a user registry
and an authentication mechanism. Optionally, you can define trust
between WebSphere Application Server and a proxy server, configure
single sign-on capability, and specify how to propagate security attributes
between application servers.
About this task
The following security topics are covered in this section:
- User registries
- For information on local operating system,
Lightweight Directory Access Protocol (LDAP), and custom user registries,
see User registries.
- Authentication protocol for EJB security
- For more information on the authentication protocols that are
used for Enterprise JavaBeans (EJB) security, see Authentication protocol for EJB security.
- Trust associations
- For more information on trust associations, see Trust associations.
- Single sign-on
- For more information on single sign-on, see Single sign-on.
- Security attribute propagation
- For more information on propagation tokens, authorization tokens,
single sign-on tokens, and authentication tokens, see Security attribute propagation.
The following information is covered in this section:
Procedure
What to do next
After completing the configuring the authentication process,
you must authorize access to resources. For more information, see
Authorizing access to resources.