Security planning - authentication and authorization
Authentication and authorization are vital to security. Due to the constantly changing authentication methodologies, including biometrics, public key infrastructure (PKI), and ever-increasing encryption algorithms, Sterling Order Management System Software provides documentation on implementing a lightweight directory access protocol (LDAP) or any Java™ Authentication and Authorization Service (JAAS) compliant security module for authentication.
With LDAP user and password management can be centralized. The default authentication mechanism is implemented against the Sterling Order Management System Software database.