Systems such as a SAML 2.0 Identity Provider, OpenSSO, Tivoli, ADFS, SiteMinder, web proxies, etc. are used to authenticate the user. An authentication token is then passed to SBM to allow login. SBM handles all authorization of the user via SBM privileges.