A computer receives a request for authentication from a client. The
computer forwards the authentication request to an authentication source.
Once the authentication source has validated the authentication request,
the computer requests authentication and cache control information from
the authentication source. The computer uses the authentication and cache
control information to populate a user object stored in a container
hierarchy and enable the computer to authenticate an authentication
request without forwarding the authentication request to the
authentication source.