A service consumer submits a message with security credentials to an authentication broker, which authenticates the credentials against a central identity store. The authentication broker then responds with a token that the service consumer can use to access Services A, B, and C (none of which have their own identity store). This scenario demonstrates the application of which pattern?
Currently there are no comments in this discussion, be the first to comment!