Security Source Logins
Context:
If the login is not identical on each source, you need to map the login entered by the
user with the pattern that exists in all the other security sources. In this case, use the
Login rewriting field and the $login
variable.
Example:
John Doe is identified by mydomain\jdoe
in the first security source and
by jdoe@mycompany.com
in the second security source.
To map both logins, enter in the Login rewriting field:
-
mydomain\$login
for the first security source -
$login@mycompany.com
for the second security source
Authentication checks that the user exists and that their password is correct. It is mandatory for at least one security source.
Authorization retrieves access rights granted to the user (security tokens). Password is optional. If the password check fails, no access right is granted to the user for the security source.