[security-dev] Credentials API redesign

Bill Burke bburke at redhat.com
Thu Dec 6 10:37:14 EST 2012



On 12/6/2012 10:00 AM, Darran Lofthouse wrote:
> I can see that there are cases where we know the User so it is desirable
> to supply it but there are still the cases where we don't know the user
> until after the credential has been verified.
>

Elaborate?  Sounds like this is protocol specific and resolving the user 
should be done in protocol code.  The IDM shouldn't be involved with 
protocol specifics.  Or, at least, it should as separated as possible 
from those specifics.

Bill

-- 
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com


More information about the security-dev mailing list