IBM InfoSphere Streams Version 4.1.1
Order of user authentication checks by InfoSphere Streams
Your user authentication configuration determines how InfoSphere® Streams authenticates users.
InfoSphere
Streams authenticates
users in the following order:
- If configured, InfoSphere Streams attempts to authenticate by using the login module configuration. If the user cannot be authenticated, InfoSphere Streams continues to the next step.
- If configured, InfoSphere Streams attempts to authenticate by using a client certificate. If the user cannot be authenticated, InfoSphere Streams continues to the next step.
- InfoSphere Streams authenticates by using the default user authentication method that was specified when you created the domain (LDAP or PAM).