A method and system for resource based authentication may include, in
response to a client attempting to access a protected resource of a
system, implementing resource based authentication. A policy agent may
intercept the client access request and redirect it to an appropriate
authentication gateway module based upon authentication polices. If the
protected resource is not associated with any resource specific
authentication technique, the policy agent may apply a default
authentication technique. If, however, the protected resource is
associated with a particular resource specific authentication technique,
the policy agent may apply the resource specific authentication technique
without applying the default authentication technique.