Authentication methods are evaluated in sequence. The first method that returns successful authentication terminates the authentication process. If a method returns an unsuccessful authentication, the process does not terminate, the next authentication method will be evaluated. Consider the following scenario when provisioning authentication for OMK applications. - First OMK First authentication method: LDAP
- Second OMK Second authentication method: htpasswd
- User Bob has an LDAP account and has a user in the htpasswd users file.
- User Bob leaves the company
- The IT department removes Bob's LDAP account assuming he will no longer be able to access corporate systems.
- Bob will still be able to access OMK applications because there is a user Bob in the htpasswd user file.
|