A security architecture has been developed in which a single sign-on is
provided for multiple information resources. Rather than specifying a
single authentication scheme for all information resources, the security
architecture associates trust-level requirements with information
resources. Authentication schemes (e.g., those based on passwords,
certificates, biometric techniques, smart cards, etc.) are employed
depending on the trust-level requirement(s) of an information resource
(or information resources) to be accessed. Once credentials have been
obtained for an entity and the entity has been authenticated to a given
trust level, access is granted, without the need for further credentials
and authentication, to information resources for which the authenticated
trust level is sufficient. In addition, an entity can be allocated a new
session and associated default credential if the entity's access request
indicates an invalid session token or does not indicate a token.