Patent attributes
The present disclosure attempts to migrate from a first authenticator to a second authenticator. In the most preferred embodiment, the first step is to migrate the data that is not stored encrypted by a traditional replication or transformation between the datastores of the authenticators. The new authenticator is placed in position, while the old authenticator is maintained. When a user attempts to login, servlets check to see if the user's password exists within the datastore for the new authenticator. If not, then the user is sent to the old authenticator's sign-on page. When the user enters their authentication credentials into the old authenticator, a code snippet or second servlet will capture this information and, on confirmation from the old authenticator that the user is properly authenticated, use the captured information to populate the new datastore.