A service consumer submits a message with security credentials to an authentication broker, which authenticates the credentials against a central identity store. The authentication broker then responds with a token that the service consumer can use to access Services A, B, and C (none of which have their own identity store). This scenario demonstrates the application of which pattern?
Brandee
5 months agoDevorah
5 months agoElenore
5 months agoAlecia
6 months agoKiera
6 months agoMammie
6 months agoCorazon
6 months agoLigia
6 months agoJanine
6 months agoMaira
7 months agoVeda
7 months agoAmmie
7 months agoDeja
12 months agoElouise
11 months agoIn
11 months agoFernanda
11 months agoFrancine
12 months agoSarina
10 months agoCarlee
10 months agoLawana
10 months agoTruman
10 months agoDaniel
10 months agoClorinda
11 months agoMisty
11 months agoIzetta
11 months agoIluminada
1 year agoMichael
11 months agoQuentin
11 months agoMarleen
1 year agoGladys
1 year agoAnjelica
1 year agoNadine
11 months agoEmogene
11 months agoDelbert
11 months agoLacey
12 months agoTorie
1 year ago