O'Reilly logo

Getting Started with IBM FileNet P8 Content Manager by William J. Carpenter

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Authentication in CM

You already know that authentication is the process of having a user prove his or her identity.

In the realm of computer security, a security principal claims an identity and proves it by presenting one or more credentials. That sounds a lot more technical, but it really just means that things other than users can be authenticated. For example, in some cases, a particular computer or application can be authenticated, and the use of the term security principal just lets computer security professionals talk about it without having to constantly qualify their statements.

You might be thinking of the credential as a password, and, in most cases today, it is. When you enter a userid and the correct password, the authentication system ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required