Pass-through authenticators use an HTTP connector to make a call outside of IDaaS for authentication. When configured, pass-through authenticators can be used as a second-factor authenticator to authenticate users with an user to IDaaS with an external service. For example, an IDaaS user wants to authenticate to an external portal that asks for the user's father's name, (it could be any information that is not captured in IDaaS). The pass-through authenticator is configured to use to use an HTTP connector to authenticate to the external portal. An HTTP response code determines whether authentication is allowed. Using the example provided, if the user responds with their correct father's name, and the connector returns 200 as a response code, the user is then authenticated to the portal.
To use a pass-through authenticator, you need to first create the pass-through authenticator definitions, and then configure the pass-through authenticator policies.
Topics in this section:
● Create pass-through authenticator definitions
● Manage pass-through authenticator policies