The Cetaris security implementation has a flexible modular architecture – highly configurable to suit your needs. Even though there are many other options available to you, the solution is usually designed to make use of your existing LDAP directory for user authentication. A user is defined once and re-used for all the tools of business.
Cetaris’ components communicate using messages that are protected using WS-I compliant encryption and bi-directional authentication. To further protect your valuable information, none of your user passwords will be stored in the database. This will ensure no unauthorized users will be granted access to your application.