A service consumer submits a message with security credentials to an authentication broker, which authenticates the credentials against a central identity store. The authentication broker then responds with a token that the service consumer can use to access Services A, B, and C (none of which have their own identity store). This scenario demonstrates the application of which pattern?
Francine
5 days agoIluminada
10 days agoMarleen
14 days agoGladys
15 days agoAnjelica
18 days agoTorie
27 days ago