Introduction to the Authentication Model

There is no single mechanism that is applicable to all authentication events throughout a typical deployment. Each deployment uses some combination of authentication processes, trust relationships, and single sign-on technologies. This helps to balance a range of goals such as the following:
  • preserve individual identity
  • minimize security exposures
  • provide a unified user experience
  • minimize set up and maintenance efforts
  • provide access to disparate systems within an environment
  • integrate into a wide variety of general computing environments