< Table of Contents

Configure Authentication and Authorization

The following checklist provides the steps necessary to configure Kaazing Gateway to perform authentication and authorization:

# Step Topic or Reference
1 Learn about authentication and authorization. About Security with Kaazing Gateway, About Authentication and Authorization, and What’s Involved in Secure Communication
2 Learn how authentication and authorization work with the Gateway. What Happens During Authentication and How Authentication and Authorization Work with the Gateway
3 Define the method the Gateway uses to secure back-end systems and respond to security challenges. Configure the HTTP Challenge Scheme
4 Configure one or more login modules to handle the challenge/response authentication sequence of events with clients. Configure a Chain of Login Modules
5 Code your client to respond to the Gateway’s authentication challenge. Configure a Challenge Handler on the Client
6 Configure the Gateway to specify the user roles that are authorized to perform operations for Gateway services. Configure Authorization
7 Configure the Gateway to authorize or deny JMS operations performed by the client, using the JMSAuthorizationFactory. Secure the Connection from Each Client to the Gateway
Optional Inject bytes into a custom protocol or promote user credentials to the AMQP protocol. Implement Protocol Injection