Show Table of Contents
3.7. Configure Pass-Through Authentication
Procedure 3.1. Configure Pass-Through Authentication
Set the security domain
Change the JBoss Data Virtualization security domain to the same name as your application's security domain name in thetransportsection of the server configuration file.
Note
For this to work, the security domain must be a JAAS based login module and your client application must obtain its JBoss Data Virtualization connection using a local connection with the
PassthroughAuthentication=true connection flag set.

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.