O'Reilly logo

Open Source Identity Management Patterns and Practices Using OpenAM 10.x by Waylon Kenning

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter we created two sites: one Apache based and the other Tomcat based, and secured them with Policy agents using authentication only. The Tomcat site was on a different domain, so we enabled Cross-Domain Single Sign On to enable OpenAM to secure that site. In the next chapter, we'll be covering distributed authentication, which allows us to protect our OpenAM installation and expose services using a component deployed to the DMZ.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required