IBM InfoSphere Streams Version 4.1.1

Order of user authentication checks by InfoSphere Streams

Your user authentication configuration determines how InfoSphere® Streams authenticates users.

InfoSphere Streams authenticates users in the following order:
  1. If configured, InfoSphere Streams attempts to authenticate by using the login module configuration. If the user cannot be authenticated, InfoSphere Streams continues to the next step.

  2. If configured, InfoSphere Streams attempts to authenticate by using a client certificate. If the user cannot be authenticated, InfoSphere Streams continues to the next step.

  3. InfoSphere Streams authenticates by using the default user authentication method that was specified when you created the domain (LDAP or PAM).