Target applications and services

This chapter provides conceptual information about how to secure target applications and services.

  • It explains the following aspects:
  • How to make sure only authenticated users can access protected applications.
  • How to define the authentication level required to access an application.
  • How Airlock IAM identifies applications and parts of applications.
  • How information about the authenticated user is made available to the target applications (identity propagation).