This chapter provides conceptual information about how to secure target applications and services.
- It explains the following aspects:
- How to make sure only authenticated users can access protected applications.
- How to define the authentication level required to access an application.
- How Airlock IAM identifies applications and parts of applications.
- How information about the authenticated user is made available to the target applications (identity propagation).