Identity Authentication can be integrated with already existing customer landscape and supports different types of delegated authentication.
The table shows the available options and what are the suitable use-cases:
Use Case |
Configuration |
---|---|
Corporate User Store |
|
Kerberos Authentication |
|
Identity Provider Proxy |
Related Information
Configuring Authorization Policies
Configuring Provisioning Systems
Configuring Real-Time Provisioning
Configuring Social Identity Providers