Manage pass-through authenticators
Pass-through authenticators use an HTTP connector to make a call outside of IDaaS for authentication. When configured, pass-through authenticators can be used as a second-factor authenticator to authenticate users with an user to IDaaS with an external service. For example, an IDaaS user wants to authenticate to an external portal that asks for the user's father's name, (it could be any information that is not captured in IDaaS). The pass-through authenticator is configured to use to use an HTTP connector to authenticate to the external portal. An HTTP response code determines whether authentication is allowed. Using the example provided, if the user responds with their correct father's name, and the connector returns 200 as a response code, the user is then authenticated to the portal.
To use a pass-through authenticator, you need to first create the pass-through authenticator definitions, and then configure the pass-through authenticator policies.
Topics in this section:
Create pass-through authenticator definitions
Pass-through authenticator definitions define the information sent to an external service through an HTTP connector. The external service uses the information configured in the pass-through connector to allow a user to use a pass-through authenticator for second-factor authentication. If the user provides the correct information as configured in the HTTP connector, the connector returns a response code to allow the user to access the protected external service.
Manage pass-through authenticator policies
You must first configure a pass-through authenticator definition before configuring the pass-through authenticator policy.