Example: Two Authentication Requirements
In this example, a user is authenticated based on network location. If that succeeds, the user is then authenticated using LDAP credentials. Both must succeed for the user to be authenticated.
This behavior is controlled by the requisite Flag.
EMSUserAuthentication { com.tibco.tibems.tibemsd.security.jaas.HostBasedAuthentication requisite tibems.hostbased.accepted_addresses="10.98.48.45, ::1" tibems.hostbased.accepted_hostnames="'jsmith.*','.tibco.com'"; com.tibco.tibems.tibemsd.security.jaas.LDAPSimpleAuthentication requisite tibems.ldap.user_pattern="uid=%u,ou=People,dc=tibco.com" tibems.ldap.url="ldap://localhost:389" ; };
Copyright © 2021. Cloud Software Group, Inc. All Rights Reserved.