Configure Authentication and Authorization
The following checklist provides the steps necessary to configure Kaazing Gateway to perform authentication and authorization:
# | Step | Topic or Reference |
---|---|---|
1 | Learn about authentication and authorization. | About Security with Kaazing Gateway, About Authentication and Authorization, and What’s Involved in Secure Communication |
2 | Learn how authentication and authorization work with the Gateway. | What Happens During Authentication and How Authentication and Authorization Work with the Gateway |
3 | Define the method the Gateway uses to secure back-end systems and respond to security challenges. | Configure the HTTP Challenge Scheme |
4 | Configure one or more login modules to handle the challenge/response authentication sequence of events with clients. | Configure a Chain of Login Modules |
5 | Code your client to respond to the Gateway’s authentication challenge. | Configure a Challenge Handler on the Client |
6 | Configure the Gateway to specify the user roles that are authorized to perform operations for Gateway services. | Configure Authorization |
7 | Configure the Gateway to authorize or deny JMS operations performed by the client, using the JMSAuthorizationFactory. | Secure the Connection from Each Client to the Gateway |
Optional | Inject bytes into a custom protocol or promote user credentials to the AMQP protocol. | Implement Protocol Injection |