Example: Two Authentication Requirements

In this example, a user is authenticated based on network location. If that succeeds, the user is then authenticated using LDAP credentials. Both must succeed for the user to be authenticated.

This behavior is controlled by the requisite Flag.

EMSUserAuthentication {
   com.tibco.tibems.tibemsd.security.jaas.HostBasedAuthentication requisite
   tibems.hostbased.accepted_addresses="10.98.48.45, ::1"
   tibems.hostbased.accepted_hostnames="'jsmith.*','.tibco.com'";
   com.tibco.tibems.tibemsd.security.jaas.LDAPSimpleAuthentication requisite
   tibems.ldap.user_pattern="uid=%u,ou=People,dc=tibco.com"
   tibems.ldap.url="ldap://localhost:389" ;
};