-
Products
JBoss Enterprise Middleware
Red Hat JBoss Fuse Developer Studio Portfolio Edition Web Framework Kit Application Platform Web Server Data Grid Portal Platform Red Hat JBoss A-MQ SOA Platform Business Rules Management System (BRMS) Data Services Platform Messaging JBoss Operations Network JBoss Community or JBoss enterprise -
Solutions
Migration Center
Migrate to Red Hat Enterprise Linux Migration Center Systems management Upgrading to Red Hat Enterprise Linux JBoss Enterprise Middleware IBM AIX to Red Hat Enterprise Linux HP-UX to Red Hat Enterprise Linux Solaris to Red Hat Enterprise Linux UNIX to Red Hat Enterprise Linux Start a conversation with Red Hat Migration services -
Training
Courses and training paths
Popular and new courses JBoss Middleware Administration curriculum Core System Administration curriculum JBoss Middleware Development curriculum Advanced System Administration curriculum Linux Development curriculum Cloud Computing and Virtualization curriculum Cloud Computing, Virtualization, and Storage curriculum
Security: Authentication
Confirm that individuals are who they claim to be
Security support and updates
Authentication is the process of confirming that something is authentic and, in particular, that users are who they claim to be. Authentication, therefore, depends on an authoritative collection of user's identities, provided by identity management.
The most common means of verifying a user's identity is by a password, though other means may supplement or replace a password. Typically, users' identities are authenticated to let them do something, like log in to a system. Successful authentication grants the ability to do something (which is called authorization and is sometimes confused with authentication).
In a heterogeneous environment with different systems and applications, user authentication and authorization should grant consistent rights in all contexts. This is generally accomplished by using users' roles, defined by their identity information, to determine their rights. For example, users with the role of guest would have minimal rights to view or modify system information.
Learn more
-
SSSD: Abstracted access to identity and authentication providers.
-
PAM: Install and manage up-to-the-minute security updates.
-
Red Hat® Directory Server: Centralized repository for your identity and user information.
-
JBoss® Enterprise Business Rules Management System (BRMS): Business policy and rules development, access, and change management.











