The document provides information about securing web applications with OpenAM. It discusses authentication and authorization as two major security considerations. It notes that while authentication verifies a user's identity, authorization determines what resources a user can access. The document then discusses challenges around scaling authentication solutions and how stateful servers may not scale well. It introduces OpenAM as an open source access management solution that can handle authentication, authorization, and identity management. OpenAM allows applications to focus on functionality while it focuses on security. It can integrate with identity stores and uses policy agents to enforce access policies across distributed systems.
Related topics: