A service consumer submits a message with security credentials to an authentication broker, which authenticates the credentials against a central identity store. The authentication broker then responds with a token that the service consumer can use to access Services A, B, and C (none of which have their own identity store). This scenario demonstrates the application of which pattern?
Deja
1 months agoElouise
1 months agoIn
1 months agoFernanda
1 months agoFrancine
2 months agoDaniel
2 days agoClorinda
10 days agoMisty
26 days agoIzetta
28 days agoIluminada
2 months agoMichael
26 days agoQuentin
1 months agoMarleen
2 months agoGladys
2 months agoAnjelica
2 months agoNadine
13 days agoEmogene
14 days agoDelbert
17 days agoLacey
1 months agoTorie
2 months ago