O'Reilly logo

Open Source Identity Management Patterns and Practices Using OpenAM 10.x by Waylon Kenning

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Distributed Authentication

In the last chapter we covered cross-domain authentication, where policy agents talk to OpenAM to verify authentication. But how do we protect OpenAM from exposure? In this chapter we'll:

  • Install distributed authentication on a separate DMZ server to protect OpenAM from direct access
  • Configure a distributed authentication server
  • Configure a distributed authentication application
  • Test a distributed authentication

Understanding distributed authentication

Distributed authentication revolves around two key concepts: how policy agents work and a defense-in-depth architecture.

How policy agents communicate with OpenAM

When a user accesses a URL that is protected by a Policy Agent, the policy agent will intercept that request ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required