There is no single mechanism
that is applicable to all authentication events throughout a typical
deployment. Each deployment uses some combination of authentication
processes, trust relationships, and single sign-on technologies. This
helps to balance a range of goals such as the following:
-
preserve individual identity
-
minimize security exposures
-
provide a unified user experience
-
minimize set up and maintenance
efforts
-
provide access to disparate systems
within an environment
-
integrate into a wide variety of
general computing environments