O'Reilly logo

Open Source Identity Management Patterns and Practices Using OpenAM 10.x by Waylon Kenning

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Configuring Authentication Chaining

In the following screenshot we show all the authentication modules available for us to use:

Configuring Authentication Chaining

You’ll notice that we have a lot of authentication modules. We don’t have to use just one authentication module, we can have multiple options. But then how do we determine which ones we want to use, and how important are they to us?

We do this in the section Authentication Chaining, where we chain authentication modules together. For our prototype we’re going to change the default authentication chain, but in a production environment it would be recommended to create a new authentication chain.

  1. In the Authentication Chaining ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required