Techniques are provided for proxy authentication. A proxy includes a first port, a second port, and a secure port; each port processing a different service. Requests received on the first and second ports which require authentication are redirected to the secure port. The secure port processes an authentication router service. The authentication router service forwards requests for authentication to selective authentication services. The authentication services authenticate the requests over the secure port.

 
Web www.patentalert.com

< Secure delegation using public key authentication

> Method and system for resource based authentication

> Stateless session Enterprise Java Bean initialization method

~ 00588