Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

Application Server

Simplified SMS Architecture Utilizing an Authentication Provider

Simplified SMS Architecture Utilizing an Authentication Provider

  • Last UpdatedJun 22, 2022
  • 2 minute read

This system design contains a minimum of two nodes for user authentication, and provides robustness and redundancy.

Node 1 - SMS on the GR or other Deployed Platform

In this simplified architecture, the System Management Server is typically installed on a GR node.

  • On the System Management Server configuration tab, select the option "This machine is the System Management Server."

  • On the Authentication Provider tab:

    • Select the checkbox to "Configure this machine to provide SSO via an external Authentication Provider."

    • Configure the token host.

Node 2 - Redundant SSO Node on the IDE

The System Management Server is typically installed on an IDE node or AppServer (run-time) node.

  • On the System Management Server configuration tab, select the option "Connect to an existing System Management Server."

    • Select node 1 as the existing SMS node.

    • Select the checkbox "Configure this machine as a Redundant SSO Server."

  • On the Authentication Provider tab:

    • Select the checkbox to "Configure this machine to provide SSO via an external Authentication Provider."

    • Configure the token host.

Node 2 is now configured as a redundant authentication provider.

Node 3 though n

  • On the System Management Server configuration tab, select the option "Connect to an existing System Management Server."

    • Select node 1 as the existing SMS node.

    • For the option to configure the node as a Redundant SSO Server, leave the checkbox unchecked.

  • On the Authentication Provider tab:

    • Select the checkbox to "Configure this machine to provide SSO via an external Authentication Provider."

      Note: Since this node is not a redundant authentication provider, the fields to configure a token host are not shown.

TitleResults for “How to create a CRG?”Also Available in