Misconfiguration of the authentication modules can negatively affect the performance of your system, harm your system’s security, cause unpredictable authentication behavior, or can prevent users from logging on at all. In the chapters that are about authentication, other login modules are added to the default set and the advised value for the flag is indicated. |
Flag value | Description |
---|---|
“requisite” | The Login Module is required to succeed. If it succeeds, authentication continues down the Login Module list. If it fails, control immediately returns to the application (authentication does not proceed down the Login Module list). |
“required” | The Login Module is required to succeed. Whether it succeeds or fails, authentication still continues to proceed down the Login Module list. |
“optional” | The Login Module is not required to succeed. Whether it succeeds or fails, authentication still continues to proceed down the Login Module list. |
“sufficient” | The Login Module is not required to succeed. If it succeeds, control immediately returns to the application (authentication does not proceed down the Login Module list). If it fails, authentication continues down the Login Module list. |