Order of user authentication checks by Teracloud® Streams

Your user authentication configuration determines how Teracloud® Streams authenticates users.

Teracloud® Streams authenticates users in the following order:
  1. If configured, Teracloud® Streams attempts to authenticate by using the login module configuration. If the user cannot be authenticated, Teracloud® Streams continues to the next step.

  2. If configured, Teracloud® Streams attempts to authenticate by using a client certificate. If the user cannot be authenticated, Teracloud® Streams continues to the next step.

  3. Teracloud® Streams authenticates by using the default user authentication method that was specified when you created the domain (LDAP or PAM).