Target applications and services

This chapter provides conceptual information about how to secure target applications and services.

It explains the following aspects.

  • how to make sure only authenticated users can access protected applications.
  • how to define the authentication level required to access an application.
  • how applications and parts of applications are identified by Airlock IAM.
  • how information about the authenticated user is made available to the target applications (identity propagation).

More detailed technical information and documentation about the configuration can be found in technical chapters and are linked in the detail pages of this chapter.