A service consumer submits a message with security credentials to an authentication broker, which authenticates the credentials against a central identity store. The authentication broker then responds with a token that the service consumer can use to access Services A, B, and C (none of which have their own identity store). This scenario demonstrates the application of which pattern?
Brandee
3 months agoDevorah
3 months agoElenore
4 months agoAlecia
4 months agoKiera
4 months agoMammie
4 months agoCorazon
4 months agoLigia
5 months agoJanine
5 months agoMaira
5 months agoVeda
5 months agoAmmie
5 months agoDeja
10 months agoElouise
10 months agoIn
10 months agoFernanda
10 months agoFrancine
10 months agoSarina
8 months agoCarlee
8 months agoLawana
8 months agoTruman
8 months agoDaniel
9 months agoClorinda
9 months agoMisty
9 months agoIzetta
10 months agoIluminada
10 months agoMichael
9 months agoQuentin
10 months agoMarleen
11 months agoGladys
11 months agoAnjelica
11 months agoNadine
9 months agoEmogene
9 months agoDelbert
9 months agoLacey
10 months agoTorie
11 months ago