Authenticating users

The process of authenticating users involves a user registry and an authentication mechanism. Optionally, you can define trust between WebSphere Application Server and a proxy server, configure single sign-on capability, and specify how to propagate security attributes between application servers.

About this task

The following security topics are covered in this section:
User registries
For information on local operating system, Lightweight Directory Access Protocol (LDAP), and custom user registries, see User registries.
Authentication protocol for EJB security
For more information on the authentication protocols that are used for Enterprise JavaBeans (EJB) security, see Authentication protocol for EJB security.
Trust associations
For more information on trust associations, see Trust associations.
Single sign-on
For more information on single sign-on, see Single sign-on.
Security attribute propagation
For more information on propagation tokens, authorization tokens, single sign-on tokens, and authentication tokens, see Security attribute propagation.

The following information is covered in this section:

Procedure

What to do next

After completing the configuring the authentication process, you must authorize access to resources. For more information, see Authorizing access to resources.



In this information ...


IBM Redbooks, demos, education, and more

(Index)

Use IBM Suggests to retrieve related content from ibm.com and beyond, identified for your convenience.

This feature requires Internet access.

Task topic    

Terms of Use | Feedback

Last updated: Sep 20, 2010 11:08:29 PM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=vela&product=was-nd-mp&topic=tsec_authusers
File name: tsec_authusers.html