proxy-authentication to SP

Cantor, Scott cantor.2 at osu.edu
Thu May 7 10:08:22 EDT 2015


On 5/7/15, 9:57 AM, "Ulf Seltmann" <seltmann at ub.uni-leipzig.de> wrote:

>Hello Dave,
>
>well it would be auditible in house as it is an open source product.
>i think i got the idea of what you are suggesting: estimating the afford
>of auditing against the afford of building a complex authentication
>structure. unfortunately i believe its not our (the executive's)
>decision.

Are these two apps part of one organization or is this a federated scenario?

It's very unusual for a single org to implement delegation between services. The most common solution is always a service account, and something like CAS proxying or use of Kerberos, both of which are essentially impersonation rather than true delegation, would be other, much less common, solutions.

-- Scott



More information about the users mailing list