Security Source Logins
Context:
If the login is not identical on each source, you need to map the login entered by the
user with the pattern that exists in all the other security sources. In this case, use the
Login rewriting field and the $login variable.
Example:
John Doe is identified by mydomain\jdoe in the first security source and
by jdoe@mycompany.com in the second security source.
To map both logins, enter in the Login rewriting field:
-
mydomain\$loginfor the first security source -
$login@mycompany.comfor the second security source
Authentication checks that the user exists and that their password is correct. It is mandatory for at least one security source.
Authorization retrieves access rights granted to the user (security tokens). Password is optional. If the password check fails, no access right is granted to the user for the security source.