Configuring Local Authentication - Novell ACCESS MANAGER 3.1 SP2 - IDENTITY SERVER GUIDE 2010 Manual

Identity server guide
Hide thumbs Also See for ACCESS MANAGER 3.1 SP2 - IDENTITY SERVER GUIDE 2010:
Table of Contents

Advertisement

Configuring Local Authentication

3
To guard against unauthorized access, Access Manager supports a number of ways for users to
authenticate. These include name/password, RADIUS token-based authentication, and X.509 digital
certificates. You configure authentication at the Identity Server by creating authentication contracts
that the components of Access Manager (such as an Access Gateway) can use to protect a resource.
Figure 3-1
illustrates the components of a contract:
Local Authentication
Figure 3-1
User Store
Classes
User stores: The user directories to which users authenticate on the back end. You set up your
user store when you create an Identity Server cluster configuration. See
"Configuring Identity User Stores," on page
Classes: The code (a Java class) that implements a particular authentication type (name/
password, RADIUS, and X.509) or means of obtaining credentials. Classes specify how the
Identity Server requests authentication information, and what it should do to validate those
credentials. See
Section 3.2, "Creating Authentication Classes," on page
Methods: The pairing of an authentication class with one or more user stores, and whether the
method identifies a user. See
Contracts: The basic unit of authentication. Contracts can be local (executed at the server) or
external (satisfied by another Identity Server). Contracts are identified by a unique URI that can
be used by Access Gateways and agents to protect resources. Contracts are comprised of one or
more authentication methods used to uniquely identify a user. You can associate multiple
methods with one contract. See
page
124.
This section also explains the following:
"Using a Password Expiration Service" on page 127
"Using Activity Realms" on page 129
"Specifying Authentication Defaults" on page 130
"Managing Direct Access to the Identity Server" on page 133
URI
A
B
Methods
104.
Section 3.3, "Configuring Authentication Methods," on page
Section 3.4, "Configuring Authentication Contracts," on
Local
External
URI
C O N
C O N
T R A
T R A
C T
C T
A
B
Contracts
Section 3.1,
117.
Configuring Local Authentication
3
122.
103

Advertisement

Table of Contents
loading

Table of Contents