Information Technology Reference
In-Depth Information
Fig 25: Access Management - Non-federated Model
In the federated case, imagine the two halves of the CAS SSO server being
stretched across a network and implemented on opposite sides of the
corporate firewall. Let's say the business partner organisation implements
the Identity Provider function. Then your organisation must implement the
Identity Consumer.
Fig 26: Access Management - Federated Model
Search WWH ::




Custom Search