A credential validation strategy is used in conjunction with an authentication mechanism. It encapsulates logic to validate user's credentials against a strategy such as database, config.ini, LDAP or others.
This page was last modified 18:30, 10 November 2011 by Daniel Wiehl.
This page has been accessed 348 times.
Back to the top