Notice: this Wiki will be going read only early in 2024 and edits will no longer be possible. Please see: https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/wikis/Wiki-shutdown-plan for the plan.
Search results
Create the page "Authorization" on this wiki! See also the search results found.
Page title matches
Page text matches
- ===Authorization=== ...s way to org.eclipse.aperi.auth. This design does not specify or alter the authorization mechanism.25 KB (3,469 words) - 23:54, 18 September 2006
- * Security -- Authentication and authorization * Server-side: JAAS approach itself is not sufficient for authorization. Role-based model of implemented by framework and UI might help25 KB (3,919 words) - 21:16, 17 October 2007
- Spaces has a convenience implementation of authorization support that space providers can use if there are no special needs. =Storing Authorization Information=4 KB (646 words) - 12:17, 20 January 2008
- ...yuser'' and ''proxypassword'' can be removed if your proxy doesn't require authorization.10 KB (1,455 words) - 05:27, 13 December 2010
- * proxyuser - authorized user for proxy; only if proxy requires authorization * proxypassword - password for proxy user; only if proxy requires authorization8 KB (1,217 words) - 17:31, 24 November 2006
- ** committer information (including authorization or role where applicable) * '''SHOULD''' support modification of developer authorization/roles20 KB (2,817 words) - 17:46, 1 February 2012
- * [[Spaces/Authorization Support]] - description of how to work with authorization2 KB (344 words) - 03:30, 6 March 2008
- *Paul – The way he was thinking of doing this, .. 1.0 doesn’t address authorization, but we could build this in *Mike – There is an underlying assumption of authorization happening based on the identity we are asserting. This is a fundamental as25 KB (4,057 words) - 17:56, 3 May 2007
- *** What if there are other authorization problems?6 KB (848 words) - 10:44, 21 August 2007
- **** ID 55 Develop Authentication/Authorization Module 100% **** ID 56 Integrate Authentication/Authorization Module 75%5 KB (794 words) - 21:48, 9 April 2007
- ...y has been a known open issue. We will need to build our authentication / authorization model based upon Higgins identity management. Corona plans to address secu7 KB (985 words) - 11:38, 17 April 2007
- Authorization level15 KB (2,196 words) - 09:48, 30 April 2007
- * Authorization service ** another specialization of an STS; ask for authorization claim values15 KB (2,324 words) - 19:03, 26 June 2007
- The <b><u>authorization subsystem</u></b> is responsible for <u>enforcing</u> a policy based on a p ...e with the defined authorization policy. If a bundle is disabled due to an authorization failure, the widget will throb a yellow or red shield, depending on the sev10 KB (1,495 words) - 18:54, 9 January 2008
- ....eclipse.core.runtime.compatibility.auth/about.html?view=co about for the Authorization Compatibility plug-in] for an example of this.3 KB (529 words) - 22:19, 20 June 2007
- ...nerated SQL'' setting, and they will be able to specify whether the curent Authorization ID should be used as the current schema or enter the current schema name by :- ''Use authorization ID as current schema''. This says that the current authorization ID should be used as the current schema.6 KB (1,059 words) - 11:31, 27 September 2007
- ...a security providers, trust roots, user authentication and on runtime code authorization. ** Security and provisioning. Authentication and authorization (JAAS) are necessary for a controlled provisioning (governance). Trusted co13 KB (2,021 words) - 04:39, 25 September 2007
- ** Equinox working on Authentication and Authorization with pluggable authentication modules based on [http://en.wikipedia.org/wik9 KB (1,316 words) - 05:04, 18 July 2007
- {{CommentBox|This is now implemented as a Space URI, and Spaces handles authorization information for spaces. }}18 KB (2,928 words) - 19:24, 20 January 2008
- ...a security providers, trust roots, user authentication and on runtime code authorization.4 KB (626 words) - 13:46, 26 September 2007
- ...nerated SQL'' setting, and they will be able to specify whether the curent Authorization ID should be used as the current schema or enter the current schema name by :- ''Use authorization ID as current schema''. This says that the current authorization ID should be used as the current schema.6 KB (1,059 words) - 11:34, 27 September 2007
- ===Authentication and Authorization=== *Ties into authorization discussion.7 KB (1,031 words) - 14:09, 12 October 2007
- == Authorization, Access Control ==6 KB (808 words) - 16:36, 25 April 2011
- ...ile service and security in these areas. Working on an authentication and authorization theme. Doing the workflow. Would like a minimal Node Orion file service.2 KB (295 words) - 16:13, 16 July 2012
- ...ation for the User to make an informed decision regarding registration and authorization of the XRDS Provider, the ISAP Provider, and the IA Provider.7 KB (1,070 words) - 16:30, 12 December 2007
- ...n-centric authorization grouping of users (while group is a resource-based authorization grouping of accounts). # Authorization5 KB (735 words) - 14:56, 15 January 2008
- ...authorization mechanism can easiliy be extended later, to allow for other Authorization schemes. ** An implementor of a new authorization scheme must add an extension point to their headless space provider plugin19 KB (3,221 words) - 16:53, 21 January 2008
- IdAS provides APIs to access identity attributes, but currently ignores authorization in terms of defining an access control model, defining management APIs, and ...de access to backing data stores which themselves incorporate some kind of authorization model, but these vary widely in capabilities and model.10 KB (1,541 words) - 15:11, 18 July 2009
- === How COSMOS enables authentication / authorization / encryption for its Web UI === === How COSMOS enables authentication / authorization / encryption for embedded-approach adopters ===1 KB (167 words) - 17:47, 28 May 2008
- ...er in the backing store as a sufficiently privileged user and then use the authorization characteristics of that user for all subsequent requests.9 KB (1,438 words) - 12:56, 24 January 2010
- Security has many aspects. This document addresses authentication, authorization and session handling. Not included are SSL certificates or encryption in an ...already provides a good set of classes for dealing with authentication and authorization4 KB (683 words) - 03:49, 8 July 2011
- ** Authorization query method? e.g. "boolean isAllowed(URI attributeType, <operation>)"3 KB (426 words) - 18:38, 28 October 2009
- ...have attributes such as priority, funding/ccn, user community, complexity, authorization, and etc that can be set independently of workflows that are part of the go554 bytes (88 words) - 12:58, 8 May 2009
- authorization properties.6 KB (1,015 words) - 07:58, 17 April 2008
- ...or executing code. Not talking here about security holes, authentication, authorization etc26 KB (4,032 words) - 17:15, 19 May 2008
- ...on in multiple phases. This overall solution will address Authentication, Authorization, and Encryption at the MDR, Broker, and UI/Client level. There is also a s3 KB (391 words) - 16:00, 16 May 2008
- We need an implementation that supports authentication ONLY (no authorization, encryption is nice to have). One of our initial adopter products has a we15 KB (2,077 words) - 10:05, 23 May 2008
- *org.remotercp.domain.authorization *org.remotercp.domain.authorization6 KB (910 words) - 07:20, 11 July 2011
- #* There were use cases described that moved beyond simply using cards for authorization. These cases involved the user granting permission for service A to consume7 KB (1,068 words) - 21:42, 7 July 2008
- ** some refactoring for authorization were done71 KB (10,112 words) - 06:43, 12 June 2012
- ...and the pluggable security concept that can be used for authentication and authorization.16 KB (2,377 words) - 04:21, 15 August 2015
- ==== SensiNact APT Repository key authorization ====7 KB (1,032 words) - 11:11, 23 February 2024
- * Matt looking for scenerios and people to talk to about authentication and authorization in the server-side space2 KB (355 words) - 14:58, 23 September 2008
- ...pse.org/forums/index.php?t=msg&th=164519 Authentication OK, but what about authorization] ...ategory:EMF]] [[Category:Authentication]] [[Category:Security]] [[Category:Authorization]]4 KB (518 words) - 02:31, 26 May 2011
- ...transferred from the data sources into SMILA's indices and used there for authorization each time a user sends a query.10 KB (1,524 words) - 17:26, 10 October 2008
- * Matt is starting security UI work in M4. Eric is starting authorization API work in M4485 bytes (69 words) - 14:21, 28 October 2008
- ...elector application should pass the Access Token Identifier by using http "Authorization" header according to the following format. <code>Authorization: HWS <Access Token Identifier></code>3 KB (468 words) - 02:14, 30 July 2009
- This page is about Security in SMILA (Authorization). Records may be associated with security information, services may use sec ...hip of users to groups must be resolvable using external DSSP services for authorization, for identification a connection to the DSSPs user/password system must be25 KB (4,089 words) - 12:32, 11 March 2011
- # For authentication and authorization against the AWS web services, g-Eclipse uses the '''Access Key ID''' and th6 KB (893 words) - 12:28, 13 October 2009
- ** provisional authorization API used to establish trust based on context and content ...l get a patch in order with some suggested code changes to the provisional authorization API. We will not plan on graduating the API in 3.51 KB (227 words) - 16:04, 24 February 2009