[security-dev] Credentials API redesign
Bill Burke
bburke at redhat.com
Thu Dec 6 10:37:14 EST 2012
On 12/6/2012 10:00 AM, Darran Lofthouse wrote:
> I can see that there are cases where we know the User so it is desirable
> to supply it but there are still the cases where we don't know the user
> until after the credential has been verified.
>
Elaborate? Sounds like this is protocol specific and resolving the user
should be done in protocol code. The IDM shouldn't be involved with
protocol specifics. Or, at least, it should as separated as possible
from those specifics.
Bill
--
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com
More information about the security-dev
mailing list