Previous Topic: Authentication SchemesNext Topic: Supported Authentication Schemes and Password Policies


Authentication Schemes Overview

Owners of network resources want to verify the identity of users who attempt to access these resources are typically. Identifying a user determines the resources that users can access, and can determine how to personalize the content for that user. Tracking anonymous uniquely is useful so that their history can be used to provide a quality experience when they once again access the network. To identify a user, authentication schemes are used.

Authentication schemes provide a way to collect credentials and determine the identity of a user. During authentication, Web Agents communicate with the Policy Server to determine the proper credentials that must be retrieved from a user who is requesting resources.

The Policy Server supports various authentication schemes. Use simple schemes for low risk network resources and complex schemes for added security for critical network resources.

The Policy Server uses authentication scheme templates, which provide the Policy Server with the information required to process a scheme. Configure authentication scheme templates using the Administrative UI.

Note: SiteMinder retains the leading and trailing spaces in Password only. The leading and trailing spaces are removed from the username.