The process of authenticating users involves a user registry and
an authentication mechanism. Optionally, you can define trust between WebSphere
Application Server and a proxy server, configure single sign-on capability,
and specify how to propagate security attributes between application servers.
About this task
The following security topics are covered in this section:
- User registries
- For information on local operating system, Lightweight
Directory Access Protocol (LDAP), and custom user registries, see User registries
.
- Authentication protocol for EJB security
- For more information on the authentication protocols that are used for
Enterprise JavaBeans (EJB) security, see Authentication protocol for EJB security
.
- Trust associations
- For more information on trust associations, see Trust associations
.
- Single sign-on
- For more information on single sign-on, see Single sign-on
.
- Security attribute propagation
- For more information on propagation tokens, authorization tokens, single
sign-on tokens, and authentication tokens, see Security attribute propagation
.
The following information is covered in this section:
Procedure
What to do next
After completing the configuring the authentication process, you
must authorize access to resources. For more information, see
Authorizing access to resources
.