A server system acting as a repository of objects available to a variety of unrelated distributed clients is likely to require a means to restrict access based on the identity of the requesting client. Identification and authentication protocols are often missing from currently available distributed object systems. The Authenticator pattern describes a general mechanism for providing identification and authentication to a server from a client. It has the added feature of allowing protocol negotiation to take place using the same procedures. The pattern operates by offering an authentication negotiation object which then provides the protected object only after authentication is successful.
[1]
E. B. Fernandez,et al.
Determining role rights from use cases
,
1997,
RBAC '97.
[2]
Douglas C. Schmidt,et al.
A Family of Design Patterns for Applications-Level Gateways
,
1996,
Theory Pract. Object Syst..
[3]
Douglas C. Schmidt.
Connector A Design Pattern for Actively Initializing Network Services
,
1998
.
[4]
Douglas C. Schmidt,et al.
Reactor: an object behavioral pattern for concurrent event demultiplexing and event handler dispatching
,
1995
.
[5]
D. B. Davis,et al.
Sun Microsystems Inc.
,
1993
.