Table of Contents

Authentication design / Authorization in IdM

User authentication with log-in and password

Unfinished version - please do not edit. Z.

Basic implementation

The user will always log in with the log-in from CzechIdm The use of log-in from the administered system is not possible since more identities can have access to the account on the administered system.

Target implementation

Once the user logs in with his log-in and password (it doesn´t matter whether the basic method is used or a token is requested), CzechIdM will proceed to the internal verification of the entered log-in data.

Log-in and password verification take place against the following data sources:

The default state of log-in and password verification is against the local database CzechIdM. The administrator may configure manually other sources against which he will carry out the verification.

Response to the authentication result against a particular source of data:

Everything will be processed using "authenticators" that will carry the information on the number, the response to the result, etc. One authentication chain will be implemented which will be put together dynamically from these authenticators. In the future, the request for more chains may arise (e.g. a different chain for basic authentication for rest, and another one for the request for oauth2 token).