Example: Two Authentication Requirements

In this example, a user is authenticated based on network location. If that succeeds, the user is then authenticated using LDAP credentials. Both must succeed for the user to be authenticated.

This behavior is controlled by the requisite Flag.

EMSUserAuthentication {
  com.tibco.tibems.tibemsd.security.jaas.HostBasedAuthentication requisite
  tibems.hostbased.accepted_addresses="10.98.48.45, ::1"
  tibems.hostbased.accepted_hostnames="'jsmith.*','.tibco.com";
  com.tibco.tibems.tibemsd.security.jaas.LDAPSimpleAuthentication requisite
  tibems.ldap.user_pattern="uid=%u,ou=People,dc=tibco.com"
  tibems.ldap.url="ldap://localhost:389" ;
};