- An initial login is the process of authenticating the user information, typically a user ID and password, and then calling the application programming interfaces (APIs) for the remote user registry to look up secure attributes that represent the user access rights.
- A propagation login is the process of validating the user information, typically an Lightweight Third Party Authentication (LTPA) token, and then deserializing a series of tokens that constitute both custom objects and token framework objects known to the WebSphere Application Server.
Saturday, December 10, 2005
Security Attribute Propagation Security Attribute Propagation in WebSphereSecurity attribute propagation provides propagation services using Java serialization for any objects that are contained in the Subject. And since serialization problems can occur when dealing with multiple platforms Websphere application server also offers a token framework that enables custom serialization fucntionality. When a request is being authenticated, a determination is made by the login modules whether this is an initial login or a propagation login.
Labels:
authentication,
security,
websphere
Subscribe to:
Post Comments (Atom)
Popular Posts
-
JUnit 4 introduces a completely different API to the older versions. JUnit 4 uses Java 5 annotations to describe tests instead of using in...
-
This post will describe how to create and deploy a Java Web Application war to Heroku using Heroku CLI. You will need a basic understanding ...
-
The previous post described how to implement a JMS messaging client using Spring JMS . This post will describe how to implement the Message ...
-
The Visitor design pattern provides a way to separate algorithms from the object structure. A consequence of this separation is the ability ...
-
A class that switches between a set of states, and behaves differently based on the current state it is in, is a good candidate for the stat...
-
Recently I was attempting to deploy to weblogic from a Jenkins installed on a Red Hat Enterprise Linux Server release 7.3 , to a remote Webl...
-
The strategy pattern is intended to provide a means to define a family of algorithms, encapsulate each one as an object, and make them inte...
-
Last week, I described how to implement JMS, using a stand-alone client and a Message Driven Bean . In this post and the next, I will descr...
-
In a previous post, I described how to use Quartz scheduler for scheduling . In this post, I describe the configuration changes required for...
-
The Command pattern is probably the most used design pattern. In command pattern, objects are used to represent actions. This allows you to ...
Having read this I thought it was really informative.
ReplyDeletewaiting for your further post thank you once again.
ReplyDeleteI was very impressed when I found your writing.
ReplyDeleteI most certainly will highly recommend this web site!
ReplyDeleteSpot lets start work on this write-up, I really think this fabulous website
ReplyDeletewow, its a incredible information. thanks for sharing.
ReplyDelete