![]() ![]() ![]() ![]() ![]() ![]() ![]() |
This chapter describes the various authentication options for an AquaLogic User Interaction deployment.
By default, AquaLogic User Interaction performs authentication using credentials stored in the AquaLogic Interaction Portal database. Beyond basic portal authentication, AquaLogic User Interaction can delegate authentication to other backend systems, such as:
Access control lists allow permissions to be granted to users and groups, and user and group properties can be pulled from backend services and mapped to portal users and groups. For details, see Access Control Lists and Profile Sources.
Authenticated users can have their credential information brokered to other backend services, allowing a single login to the portal to enable access to various systems. For details, see Brokering Credentials.
The portal can be configured to delegate authentication to various other systems, including remote authentication tiers such as LDAP servers and Active Directory, SSO providers such as Oblix or Netegrity, and Windows Integrated Authentication (WIA). The following sections describe delegating authentication to these systems.
Authentication can be delegated to a remote authentication tier by implementing an AquaLogic Interaction authentication service. The authentication service serves two roles: synchronization and authentication.
Synchronization against a backend authentication source imports users and groups into the AquaLogic Interaction portal database. This must be done before the portal user can authenticate against the backend authentication source. Passwords are not imported. This allows portal object permissions to be mapped to external users and groups, while maintaining authentication solely by the backend authentication source.
Authentication allows the portal to query a backend authentication source using a user’s credentials. The sequence of events in the process is as follows:
AquaLogic Interaction includes pre-made authentication services supporting LDAP and Active Directory backend systems. In addition, you can develop custom authentication services to authenticate against any backend system.
Delegating authentication to an SSO provider can circumvent the AquaLogic Interaction login screen and present the user with the login method of the SSO provider. This allows authentication by non-Web form mechanisms, such as keycards or biometric authentication.
The sequence of events of this process as follows:
Delegating to Windows Integrated Authentication (WIA) is similar to delegating to an SSO source. With WIA, the user’s credentials are the same as their Windows network credentials. When the user browses to the portal page, the portal uses Windows to authenticate the user.
Prior to authenticating with WIA, user information must be crawled into the portal database using an Active Directory authentication source.
The sequence of events in the WIA authentication process is as follows:
For WIA to work, the user must be logged into a Windows network and be using a browser, such as Internet Explorer, that supports the WIA handshake. WIA will fail over an HTTP proxy.
Access Control Lists (ACLs) allow users and groups to be granted permission to use and modify objects in the portal. Portal users who authenticate with any of the methods described in the section Delegating Authentication can be identified within the portal database and added to object ACLs.
A profile service uses an authentication service to pull user properties from backend systems such as LDAP services. Properties in the backend system are mapped to AquaLogic Interaction portal properties and synchronized with the authentication service.
The credentials of a logged in user can be made available to other systems being accessed via the AquaLogic Interaction portal. This allows applications in the portal to display information from systems such as email or other enterprise applications without requiring for the user to log into each of these systems separately.
There are various ways AquaLogic Interaction can pass credentials to backend systems:
![]() ![]() ![]() |