This repository has been archived by the owner on Oct 20, 2024. It is now read-only.
Replies: 1 comment
-
Hello, I don't know how SOAP authentication works in details. A quick search gives me this documentation, so I guess one could implement a Glewlwyd authentication scheme where Glewlwyd would act as a proxy. But it's only a hypothesis. At least, the authentication scheme architecture is designed to help these kind of goals. You can check the scheme documentation and try to implement your own authentication scheme. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I have a situation where I'm using a legacy (and I mean truly old) SOAP process for authentication, but need to use that legacy authentication mechanism for newer software programs that use OAUTH2. Obviously, the newer software applications won't use that kind of legacy authentication mechanism, so I was wondering if glewlwyd could be used as an authentication proxy, wherein the new software applications authenticate off glewlwyd using OAUTH2, but glewlwyd first queries the legacy authentication mechanism to determine if the use's credentials are valid (and then act accordingly). Is that possible?
Beta Was this translation helpful? Give feedback.
All reactions