Authentication

Generally, the most commonly implemented form of protecting resources is verifying the identity of the person trying to enter the network system—authentication. Enterprise Security supports two types of user authentication—user name and password, and digital certificates.

Figure 1-1 illustrates the authentication process, where:

  1. A user accesses the portal login page through a Web browser.

  2. The user enters his or her user name and password.

  3. An authentication request with the user name and password is passed to either an LDAP server or the ACDB.

  4. If authentication is performed through LDAP, the information (success or failure) is replicated to the ACDB.

  5. The system verifies that the user has permission to read the home page.

  6. The user is authenticated and the home page displays.

Figure 1-1: Enterprise system architecture