Skip to main content

Notice: this Wiki will be going read only early in 2024 and edits will no longer be possible. Please see: https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/wikis/Wiki-shutdown-plan for the plan.

Jump to: navigation, search

Search results

Page title matches

Page text matches

  • ...ree/main/basyx.examples/src/main/java/org/eclipse/basyx/examples/scenarios/authorization/combined example repository]. ...two main [[BaSyx_/_Documentation_/_Components_/_Security_/_Authorization | authorization strategies]].
    3 KB (509 words) - 07:27, 22 September 2023
  • # Consumability. Graduate authorization APIs for Trusted Bundle feature, ensure consistency across PKI based use-ca ...utions to the need for fine grained (but still usable and deployable) code authorization scenarios
    2 KB (326 words) - 18:55, 4 February 2009
  • ===Proposal for improvements to the Authorization & Access Control package of SQLModel=== ...ched zip contains a document describing a proposal for improvements to the Authorization & Access Control package of SQLModel.
    8 KB (1,052 words) - 20:57, 7 January 2008
  • # Authorization # Enables Authorization via OAuth2, disabled by default
    26 KB (2,517 words) - 13:01, 11 July 2023
  • ** Authorization query method? e.g. "boolean isAllowed(URI attributeType, <operation>)"
    6 KB (815 words) - 10:54, 16 December 2008
  • Due to the problem that Eclipse itself lacks an own authentication and authorization system. To solve the authorization part of this problem, the activities were extended
    4 KB (688 words) - 13:53, 30 May 2013
  • ...Syx_/_Documentation_/_Components_/_AAS_Server_/_Features_/_Authorization | Authorization]]
    2 KB (206 words) - 09:57, 29 June 2023
  • = Authorization = The authorization is a basic implementation to enable only authorized requests for <code>WRIT
    6 KB (654 words) - 04:22, 15 September 2023
  • = Authorization = An example for the authorization can be found in the [[BaSyx_/_Scenarios_/_Authorization | scenario with Key
    5 KB (549 words) - 04:23, 15 September 2023
  • ...or at least invoking) the tool. Single sign-on (SSO) extends the notion of authorization by only asking the user to authenticate once, and then reusing that authent ...e other tools. We will refer to that “fact of his authorization” as an authorization token.
    18 KB (2,963 words) - 20:22, 6 September 2006
  • Databases typically used by Foundation staff (and typically require authorization). COMMITTERS: If you need to access some data here, please request an API
    24 KB (3,442 words) - 20:50, 27 May 2018
  • * There are some proposals from IBM but no travel authorization as yet
    4 KB (691 words) - 19:47, 11 January 2010
  • // read the authorization data
    83 KB (13,239 words) - 13:08, 7 February 2024
  • == Authorization ==
    4 KB (750 words) - 11:06, 29 March 2007
  • If NTLM authentication fails the '''[http://ntlmaps.sourceforge.net/ NTLM Authorization Proxy Server]''' has been reported to '''work''' with Mylyn.
    112 KB (17,765 words) - 07:51, 20 April 2018
  • .../&id=382 Higgins Tutorial At EclipseCON on March 17 - Identity Management, Authorization and User Profiles: Higgins 1.0 and beyond] January 29, 2008
    19 KB (2,542 words) - 16:48, 15 August 2014
  • # Authorization of access to object attributes using role-based access control lists
    4 KB (665 words) - 08:29, 15 December 2008
  • org.eclipse.aperi.authorization<br> ===== Authorization (org.eclipse.aperi.authorization plug-in) =====
    48 KB (7,149 words) - 11:54, 12 September 2006
  • ==Application-Level Authentication and Authorization of Resources in the BaSyx Server==
    19 KB (2,870 words) - 03:26, 15 September 2023
  • * Authorization
    26 KB (3,542 words) - 13:56, 15 January 2007
  • ===Authorization=== ...s way to org.eclipse.aperi.auth. This design does not specify or alter the authorization mechanism.
    25 KB (3,469 words) - 23:54, 18 September 2006
  • * Security -- Authentication and authorization * Server-side: JAAS approach itself is not sufficient for authorization. Role-based model of implemented by framework and UI might help
    25 KB (3,919 words) - 21:16, 17 October 2007
  • Spaces has a convenience implementation of authorization support that space providers can use if there are no special needs. =Storing Authorization Information=
    4 KB (646 words) - 12:17, 20 January 2008
  • ...yuser'' and ''proxypassword'' can be removed if your proxy doesn't require authorization.
    10 KB (1,455 words) - 05:27, 13 December 2010
  • * proxyuser - authorized user for proxy; only if proxy requires authorization * proxypassword - password for proxy user; only if proxy requires authorization
    8 KB (1,217 words) - 17:31, 24 November 2006
  • ** committer information (including authorization or role where applicable) * '''SHOULD''' support modification of developer authorization/roles
    20 KB (2,817 words) - 17:46, 1 February 2012
  • * [[Spaces/Authorization Support]] - description of how to work with authorization
    2 KB (344 words) - 03:30, 6 March 2008
  • *Paul – The way he was thinking of doing this, .. 1.0 doesn’t address authorization, but we could build this in *Mike – There is an underlying assumption of authorization happening based on the identity we are asserting. This is a fundamental as
    25 KB (4,057 words) - 17:56, 3 May 2007
  • *** What if there are other authorization problems?
    6 KB (848 words) - 10:44, 21 August 2007
  • **** ID 55 Develop Authentication/Authorization Module 100% **** ID 56 Integrate Authentication/Authorization Module 75%
    5 KB (794 words) - 21:48, 9 April 2007
  • ...y has been a known open issue. We will need to build our authentication / authorization model based upon Higgins identity management. Corona plans to address secu
    7 KB (985 words) - 11:38, 17 April 2007
  • Authorization level
    15 KB (2,196 words) - 09:48, 30 April 2007
  • * Authorization service ** another specialization of an STS; ask for authorization claim values
    15 KB (2,324 words) - 19:03, 26 June 2007
  • The <b><u>authorization subsystem</u></b> is responsible for <u>enforcing</u> a policy based on a p ...e with the defined authorization policy. If a bundle is disabled due to an authorization failure, the widget will throb a yellow or red shield, depending on the sev
    10 KB (1,495 words) - 18:54, 9 January 2008
  • ....eclipse.core.runtime.compatibility.auth/about.html?view=co about for the Authorization Compatibility plug-in] for an example of this.
    3 KB (529 words) - 22:19, 20 June 2007
  • ...nerated SQL'' setting, and they will be able to specify whether the curent Authorization ID should be used as the current schema or enter the current schema name by :- ''Use authorization ID as current schema''. This says that the current authorization ID should be used as the current schema.
    6 KB (1,059 words) - 11:31, 27 September 2007
  • ...a security providers, trust roots, user authentication and on runtime code authorization. ** Security and provisioning. Authentication and authorization (JAAS) are necessary for a controlled provisioning (governance). Trusted co
    13 KB (2,021 words) - 04:39, 25 September 2007
  • ** Equinox working on Authentication and Authorization with pluggable authentication modules based on [http://en.wikipedia.org/wik
    9 KB (1,316 words) - 05:04, 18 July 2007
  • {{CommentBox|This is now implemented as a Space URI, and Spaces handles authorization information for spaces. }}
    18 KB (2,928 words) - 19:24, 20 January 2008
  • ...a security providers, trust roots, user authentication and on runtime code authorization.
    4 KB (626 words) - 13:46, 26 September 2007
  • ...nerated SQL'' setting, and they will be able to specify whether the curent Authorization ID should be used as the current schema or enter the current schema name by :- ''Use authorization ID as current schema''. This says that the current authorization ID should be used as the current schema.
    6 KB (1,059 words) - 11:34, 27 September 2007
  • ===Authentication and Authorization=== *Ties into authorization discussion.
    7 KB (1,031 words) - 14:09, 12 October 2007
  • == Authorization, Access Control ==
    6 KB (808 words) - 16:36, 25 April 2011
  • ...ile service and security in these areas. Working on an authentication and authorization theme. Doing the workflow. Would like a minimal Node Orion file service.
    2 KB (295 words) - 16:13, 16 July 2012
  • ...ation for the User to make an informed decision regarding registration and authorization of the XRDS Provider, the ISAP Provider, and the IA Provider.
    7 KB (1,070 words) - 16:30, 12 December 2007
  • ...n-centric authorization grouping of users (while group is a resource-based authorization grouping of accounts). # Authorization
    5 KB (735 words) - 14:56, 15 January 2008
  • ...authorization mechanism can easiliy be extended later, to allow for other Authorization schemes. ** An implementor of a new authorization scheme must add an extension point to their headless space provider plugin
    19 KB (3,221 words) - 16:53, 21 January 2008
  • IdAS provides APIs to access identity attributes, but currently ignores authorization in terms of defining an access control model, defining management APIs, and ...de access to backing data stores which themselves incorporate some kind of authorization model, but these vary widely in capabilities and model.
    10 KB (1,541 words) - 15:11, 18 July 2009
  • === How COSMOS enables authentication / authorization / encryption for its Web UI === === How COSMOS enables authentication / authorization / encryption for embedded-approach adopters ===
    1 KB (167 words) - 17:47, 28 May 2008
  • ...er in the backing store as a sufficiently privileged user and then use the authorization characteristics of that user for all subsequent requests.
    9 KB (1,438 words) - 12:56, 24 January 2010

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

Back to the top