In a previous blog post we provided a high-level overview on security-related topics for using metaphactory in an enterprise environment.
This post dives deeper into authentication and authorization using single sign-on and also covers how the authentication process can be integrated with databases or external services such as third-party REST endpoints.
Read this blog post to learn about single sign-on and identity management with metaphactory »