Consistency of Systems




An identity authentication or authorization system must operate consistently for different users, devices and contexts


For every request made into an authentication or authorization, not only must the method of processing a request be consistent for the same user, the method of processing must be consistent for different users, devices or contexts that expect a response from the service.


For example, if a system requires a username and password to authenticate a user, every request must require that data - the result can of course by different.


This will provide a contract between the calling service and the authentication or authorization service.





© Copyright 2016. All Rights Reserved.

8901 Marmora Road,

Glasgow, D04 89GR