Skip to main content

Notice: This Wiki is now read only and edits are no longer possible. Please see: https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/wikis/Wiki-shutdown-plan for the plan.

Jump to: navigation, search

Search results

Page title matches

Page text matches

  • |width="10*" | Centralized Authentication and Authorization. See User Stories: [[Swordfish_Documentation:_User_Stories:_Service_Develop
    9 KB (1,023 words) - 04:01, 3 June 2009
  • * Discuss provisional authorization APIs [https://bugs.eclipse.org/bugs/show_bug.cgi?id=266554 bug 266554] ...rg/bugs/show_bug.cgi?id=266888 bug 266888] without having to use or change authorization API?
    791 bytes (126 words) - 15:41, 3 March 2009
  • Authorization on operation level.
    4 KB (615 words) - 08:07, 27 March 2009
  • Authentication and Authorization How can an Authentication and Authorization Concept also be applied to this ‘local’ configuration?
    3 KB (364 words) - 08:08, 27 March 2009
  • [[Jetty/Feature/JAAS|Java Authentication and Authorization Service (JAAS)]]<br/>
    13 KB (1,809 words) - 03:34, 2 July 2013
  • ...dfish_Documentation:_Product_Backlog#0300 | Centralized Authentication and Authorization]] |width="10*" | I want to use policy controled '''authorization''',
    15 KB (1,890 words) - 02:53, 3 June 2009
  • This page is about Security in SMILA (Authorization). Records may be associated with security information, services may use sec
    11 KB (1,609 words) - 05:09, 16 January 2012
  • ...dfish_Documentation:_Product_Backlog#0300 | Centralized Authentication and Authorization]] ...dfish_Documentation:_Product_Backlog#0300 | Centralized Authentication and Authorization]]
    13 KB (1,567 words) - 04:03, 3 June 2009
  • * authorization - some can fully manage the system while others can only monitor its state
    5 KB (870 words) - 14:16, 24 April 2009
  • ...s AccessToken.Id by using authorization http header with prefix HWS <code>"Authorization: HWS <Access Token Identifier>"</code>.
    6 KB (813 words) - 11:04, 6 July 2009
  • ...ed to transition back to the "Analyze" state from the "Authorize" state if authorization failed and more analysis is needed.
    18 KB (2,922 words) - 17:48, 14 September 2016
  • When configuring BaSyx application using the authorization feature backend, always put the prefix "basyxsecurity_" at begin of an envi | authorization.strategy
    9 KB (997 words) - 05:41, 4 October 2023
  • * [[/JAAS|Java Authentication and Authorization Service (JAAS)]]
    4 KB (419 words) - 01:44, 3 August 2012
  • '''2. On the first login GerritHub requests authorization for read access to GitHub'''.
    79 KB (12,107 words) - 07:16, 4 December 2023
  • *Allows remote de-authorization of selectors ...encrypted using auth service's certificate and http Authorization header (Authorization: HWS &lt;session_token&gt;)
    20 KB (2,869 words) - 11:02, 23 May 2010
  • authorization to change the abstract of a bug (that is, you didn't open it) then you will
    3 KB (578 words) - 13:32, 3 May 2011
  • '''Note''':<code>When trying to access your Server, with authorization enabled, from an external source, you have to set up HTTPS. You can find a === Restricting access via Authorization ===
    2 KB (316 words) - 02:33, 16 September 2022
  • *<u>''Continue without authorization code''</u> creates the account in the "non-serialized" mode (does not requi *'''Authorization Code''' is the OTP sent to the user
    7 KB (1,136 words) - 14:25, 11 May 2010
  • * IBM got their unpacking authorization and are getting it set up.
    3 KB (577 words) - 17:19, 5 November 2009
  • ...several ways. For a complete tutorial about controlling authentication and authorization in JMX, see [https://blogs.oracle.com/lmalventosa/entry/jmx_authentication_
    7 KB (1,011 words) - 14:03, 23 April 2013

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)

Back to the top