in what context? Using windows I normally use the NT security.
LDAP works quite well. Most systems support LDAP as backend, and there are a whole lot of different servers available (openldap, sun directory server, etc).
First of all I would assume you mean Single Sign on, which in iteself has lots of different meanings and implementations, you will have to give some more info
Not SSO. Well not really. Kerberos implementations are likely to form the authentication part of the equation so that will take care of SSO.
So, given an authenticated client request I need a general, flexible authorization infrastructure with central policy controls.
The complexity of authorization and per service requirements normally means that such a thing is impossible, but I thought it would be interesting to get others ideas and thoughts.
Yet again you are vague, sorry, I am a back end person, do you need to pass on your authorisation tokens to other systems and they have to accpect / authenticate it before transactions can continio?
Maybe you need to share what technoilogy infrastructure you are using as they all handle it in different ways
EDIT: BTW, this is one of the issues I am currently facing
B then requests a certain resource from A. A now needs to determine if client B is authorized to access this resource.
Ok, we are talking authorization and not authentication.
Are you going to use a web technology?
An interesting question. The services would most likely be based on HTTP. How does it affect the situation though?
As for authorization we have a filter in place that checks every (https) request to see if the user that are making the request is actually allowed to access that specific function.
Yep we built our own, we are now looking at maybe using something like the spring authorization engine.
And yes, multiple services (and multiple back end systems), thats why I mentioned the authentication piece.