Skip to main content

Notice: this Wiki will be going read only early in 2024 and edits will no longer be possible. Please see: https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/wikis/Wiki-shutdown-plan for the plan.

Jump to: navigation, search

Search results

Page title matches

Page text matches

  • ===Authorization=== ...s way to org.eclipse.aperi.auth. This design does not specify or alter the authorization mechanism.
    25 KB (3,469 words) - 23:54, 18 September 2006
  • * Security -- Authentication and authorization * Server-side: JAAS approach itself is not sufficient for authorization. Role-based model of implemented by framework and UI might help
    25 KB (3,919 words) - 21:16, 17 October 2007
  • Spaces has a convenience implementation of authorization support that space providers can use if there are no special needs. =Storing Authorization Information=
    4 KB (646 words) - 12:17, 20 January 2008
  • ...yuser'' and ''proxypassword'' can be removed if your proxy doesn't require authorization.
    10 KB (1,455 words) - 05:27, 13 December 2010
  • * proxyuser - authorized user for proxy; only if proxy requires authorization * proxypassword - password for proxy user; only if proxy requires authorization
    8 KB (1,217 words) - 17:31, 24 November 2006
  • ** committer information (including authorization or role where applicable) * '''SHOULD''' support modification of developer authorization/roles
    20 KB (2,817 words) - 17:46, 1 February 2012
  • * [[Spaces/Authorization Support]] - description of how to work with authorization
    2 KB (344 words) - 03:30, 6 March 2008
  • *Paul – The way he was thinking of doing this, .. 1.0 doesn’t address authorization, but we could build this in *Mike – There is an underlying assumption of authorization happening based on the identity we are asserting. This is a fundamental as
    25 KB (4,057 words) - 17:56, 3 May 2007
  • *** What if there are other authorization problems?
    6 KB (848 words) - 10:44, 21 August 2007
  • **** ID 55 Develop Authentication/Authorization Module 100% **** ID 56 Integrate Authentication/Authorization Module 75%
    5 KB (794 words) - 21:48, 9 April 2007
  • ...y has been a known open issue. We will need to build our authentication / authorization model based upon Higgins identity management. Corona plans to address secu
    7 KB (985 words) - 11:38, 17 April 2007
  • Authorization level
    15 KB (2,196 words) - 09:48, 30 April 2007
  • * Authorization service ** another specialization of an STS; ask for authorization claim values
    15 KB (2,324 words) - 19:03, 26 June 2007
  • The <b><u>authorization subsystem</u></b> is responsible for <u>enforcing</u> a policy based on a p ...e with the defined authorization policy. If a bundle is disabled due to an authorization failure, the widget will throb a yellow or red shield, depending on the sev
    10 KB (1,495 words) - 18:54, 9 January 2008
  • ....eclipse.core.runtime.compatibility.auth/about.html?view=co about for the Authorization Compatibility plug-in] for an example of this.
    3 KB (529 words) - 22:19, 20 June 2007
  • ...nerated SQL'' setting, and they will be able to specify whether the curent Authorization ID should be used as the current schema or enter the current schema name by :- ''Use authorization ID as current schema''. This says that the current authorization ID should be used as the current schema.
    6 KB (1,059 words) - 11:31, 27 September 2007
  • ...a security providers, trust roots, user authentication and on runtime code authorization. ** Security and provisioning. Authentication and authorization (JAAS) are necessary for a controlled provisioning (governance). Trusted co
    13 KB (2,021 words) - 04:39, 25 September 2007
  • ** Equinox working on Authentication and Authorization with pluggable authentication modules based on [http://en.wikipedia.org/wik
    9 KB (1,316 words) - 05:04, 18 July 2007
  • {{CommentBox|This is now implemented as a Space URI, and Spaces handles authorization information for spaces. }}
    18 KB (2,928 words) - 19:24, 20 January 2008
  • ...a security providers, trust roots, user authentication and on runtime code authorization.
    4 KB (626 words) - 13:46, 26 September 2007

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)

Back to the top