You deplyed a pega web mashup implementation into production and are using IACAuthentication.
which two action ensure that the external authentication module, and not another source, has validated the user?
In the IACAuthentication service, map a passoword attribute form the LDAP server used by the external
In an IAC authentication activity, add a step to idenify the security token provied by the external authentication module.
in the IACAuthentication service, specify the appropriate bind password used by the host system
In an IAC authentication activity, add steps that return the security token to the external authentication module for verification.
Submit