The Brokered Authentication pattern needs to be used in conjunction with the Data Confidentiality and Data Origin Authentication patterns in order to ensure that claims held in security tokens remain secure and that the security tokens are actually issued by a valid authentication broker. What is wrong with this statement?
Currently there are no comments in this discussion, be the first to comment!