O'Reilly logo

Open Source Identity Management Patterns and Practices Using OpenAM 10.x by Waylon Kenning

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Application Authentication with Fedlets

In the last chapter we covered distributed authentication as a way of protecting our OpenAM server. In this chapter we'll look at securing a Java application without installing a policy agent. Instead, we'll provide authentication and authorization information directly to the application using a Fedlet.

Understanding Fedlets

Fedlets are small deployable web applications that allow you to easily integrate your existing web application with OpenAM without having to write a lot of authentication and authorization code.

Advantages of Fedlets over policy agents

In our earlier chapters, we discussed policy agents, which, are installed against specific web servers and application servers, intercept requests ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required