Unified Agent security

Unified Agent security does not maintain its own security repository, except in supporting a UAF enabled from outside the machine running UAF. Instead, it delegates the authentication to existing systems such as Adaptive Server or the operating system. Security modules define these systems to which security has been delegated.

When a user is authenticated, roles for the user are retrieved by the security module and are mapped to Unified Agent defined roles. Permission to Unified Agent resources are granted to Unified Agent roles. Authorization is resolved through the mappings between the security module native roles and Unified Agent roles.

The Security Service authenticates logins and authorizes access to agent resources. It also provides password encryption services.