CHAPTER 10Authentication and SSO: Accessing What I’ve Been Granted

The answer is Man, spake Oedipus. And so the Sphinx threw herself from the mount, and Oedipus entered the city of Thebes.

—An example of authentication in ancient mythology

We’re past the building blocks, the design and assembly of the foundation for the framework. Now we’re ready to use the framework on a day-to-day basis, the processes that govern users as they log in and make use of the organization’s digital resources. A user is identified, cataloged, placed in the hierarchy, provisioned for access, and is now ready to use those assets. The system knows who you are, but now you have to log in and say, this is me. This means authentication. It may seem simple, because the majority ...

Get Designing an IAM Framework with Oracle Identity and Access Management Suite now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.