Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education Exam S90.18 Topic 5 Question 73 Discussion

Actual exam question for Arcitura Education's S90.18 exam
Question #: 73
Topic #: 5
[All S90.18 Questions]

A service consumer submits a message with security credentials to an authentication broker, which authenticates the credentials against a central identity store. The authentication broker then responds with a token that the service consumer can use to access Services A, B, and C (none of which have their own identity store). This scenario demonstrates the application of which pattern?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Deja
1 months ago
This is a tricky one. I'm leaning towards C, but I can't help but wonder if there's some kind of fancy name for this pattern that I'm just not familiar with. Maybe it's 'The Broker of All Authentication Brokers' or something like that.
upvoted 0 times
Elouise
1 months ago
Yeah, that way the service consumer can access multiple services without each one having its own identity store.
upvoted 0 times
...
In
1 months ago
I agree, it makes sense for the authentication broker to authenticate against a central identity store.
upvoted 0 times
...
Fernanda
1 months ago
I think it's C) Identity Store Authentication.
upvoted 0 times
...
...
Francine
2 months ago
Haha, 'Direct Authentication'? That sounds more like a WWE wrestler than a design pattern! I'm going with C - Identity Store Authentication. Gotta love those central identity stores, am I right?
upvoted 0 times
Daniel
2 days ago
Yeah, having a central identity store simplifies the authentication process.
upvoted 0 times
...
Clorinda
10 days ago
Central identity stores definitely make authentication easier.
upvoted 0 times
...
Misty
26 days ago
I think C - Identity Store Authentication makes the most sense in this scenario.
upvoted 0 times
...
Izetta
28 days ago
I agree, 'Direct Authentication' does sound like a wrestler name!
upvoted 0 times
...
...
Iluminada
2 months ago
Hmm, I'm not sure. Maybe it's the Identity Store Authentication pattern since the credentials are being checked against a central identity store? Or is that just a part of the overall pattern? Decisions, decisions.
upvoted 0 times
Michael
26 days ago
Yeah, I agree. It sounds like the Identity Store Authentication pattern is being applied in this scenario.
upvoted 0 times
...
Quentin
1 months ago
I think you're on the right track. It does seem like the authentication is being done against a central identity store.
upvoted 0 times
...
...
Marleen
2 months ago
I'm not sure, but I think it could also be A) Data Origin Authentication because it involves verifying the source of the data.
upvoted 0 times
...
Gladys
2 months ago
I agree with Torie. The scenario clearly mentions authentication against a central identity store.
upvoted 0 times
...
Anjelica
2 months ago
This sounds like the Token Authentication pattern to me. The service consumer gets a token from the authentication broker, which it can then use to access the other services. Easy peasy!
upvoted 0 times
Nadine
13 days ago
Exactly, it's like a key to unlock the services.
upvoted 0 times
...
Emogene
14 days ago
That makes sense, it's a secure way to authenticate.
upvoted 0 times
...
Delbert
17 days ago
Yeah, the service consumer gets a token to access the other services.
upvoted 0 times
...
Lacey
1 months ago
I think it's definitely the Token Authentication pattern.
upvoted 0 times
...
...
Torie
2 months ago
I think the answer is C) Identity Store Authentication.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77