Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

What security is available?

security
0
10 Posted

What security is available?

0

Pentaho BI Framework uses Acegi Security for a pluggable framework to implement and combine multiple authentication schemes and credential stores and CAS for platform-neutral single sign-on (SSO).

0

Pentaho Reporting is part of the Pentaho BI Framework, which uses JOSSO for platform-neutral single sign-on (SSO). JOSSO is based on JAAS which provides a pluggable framework to implement and combine multiple authentication schemes and credential stores. An authentication scheme is a security mechanism used to verify a user identity based on their credentials. ?? JOSSO provides userid/password authentication, and certificate based authentication. So, for example, you could configure JOSSO to use certificate-based authentication using x.509 certificates from a database using JDBC, userid/password authentication from an XML document, LDAP authentication, etc.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123