Skip to main content

Notice: this Wiki will be going read only early in 2024 and edits will no longer be possible. Please see: https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/wikis/Wiki-shutdown-plan for the plan.

Jump to: navigation, search

Search results

Page title matches

Page text matches

  • ...ree/main/basyx.examples/src/main/java/org/eclipse/basyx/examples/scenarios/authorization/combined example repository]. ...two main [[BaSyx_/_Documentation_/_Components_/_Security_/_Authorization | authorization strategies]].
    3 KB (509 words) - 07:27, 22 September 2023
  • # Consumability. Graduate authorization APIs for Trusted Bundle feature, ensure consistency across PKI based use-ca ...utions to the need for fine grained (but still usable and deployable) code authorization scenarios
    2 KB (326 words) - 18:55, 4 February 2009
  • ===Proposal for improvements to the Authorization & Access Control package of SQLModel=== ...ched zip contains a document describing a proposal for improvements to the Authorization & Access Control package of SQLModel.
    8 KB (1,052 words) - 20:57, 7 January 2008
  • # Authorization # Enables Authorization via OAuth2, disabled by default
    26 KB (2,517 words) - 13:01, 11 July 2023
  • ** Authorization query method? e.g. "boolean isAllowed(URI attributeType, <operation>)"
    6 KB (815 words) - 10:54, 16 December 2008
  • Due to the problem that Eclipse itself lacks an own authentication and authorization system. To solve the authorization part of this problem, the activities were extended
    4 KB (688 words) - 13:53, 30 May 2013
  • ...Syx_/_Documentation_/_Components_/_AAS_Server_/_Features_/_Authorization | Authorization]]
    2 KB (206 words) - 09:57, 29 June 2023
  • = Authorization = The authorization is a basic implementation to enable only authorized requests for <code>WRIT
    6 KB (654 words) - 04:22, 15 September 2023
  • = Authorization = An example for the authorization can be found in the [[BaSyx_/_Scenarios_/_Authorization | scenario with Key
    5 KB (549 words) - 04:23, 15 September 2023
  • ...or at least invoking) the tool. Single sign-on (SSO) extends the notion of authorization by only asking the user to authenticate once, and then reusing that authent ...e other tools. We will refer to that “fact of his authorization” as an authorization token.
    18 KB (2,963 words) - 20:22, 6 September 2006
  • Databases typically used by Foundation staff (and typically require authorization). COMMITTERS: If you need to access some data here, please request an API
    24 KB (3,442 words) - 20:50, 27 May 2018
  • * There are some proposals from IBM but no travel authorization as yet
    4 KB (691 words) - 19:47, 11 January 2010
  • // read the authorization data
    83 KB (13,239 words) - 13:08, 7 February 2024
  • == Authorization ==
    4 KB (750 words) - 11:06, 29 March 2007
  • If NTLM authentication fails the '''[http://ntlmaps.sourceforge.net/ NTLM Authorization Proxy Server]''' has been reported to '''work''' with Mylyn.
    112 KB (17,765 words) - 07:51, 20 April 2018
  • .../&id=382 Higgins Tutorial At EclipseCON on March 17 - Identity Management, Authorization and User Profiles: Higgins 1.0 and beyond] January 29, 2008
    19 KB (2,542 words) - 16:48, 15 August 2014
  • # Authorization of access to object attributes using role-based access control lists
    4 KB (665 words) - 08:29, 15 December 2008
  • org.eclipse.aperi.authorization<br> ===== Authorization (org.eclipse.aperi.authorization plug-in) =====
    48 KB (7,149 words) - 11:54, 12 September 2006
  • ==Application-Level Authentication and Authorization of Resources in the BaSyx Server==
    19 KB (2,870 words) - 03:26, 15 September 2023
  • * Authorization
    26 KB (3,542 words) - 13:56, 15 January 2007
  • ===Authorization=== ...s way to org.eclipse.aperi.auth. This design does not specify or alter the authorization mechanism.
    25 KB (3,469 words) - 23:54, 18 September 2006
  • * Security -- Authentication and authorization * Server-side: JAAS approach itself is not sufficient for authorization. Role-based model of implemented by framework and UI might help
    25 KB (3,919 words) - 21:16, 17 October 2007
  • Spaces has a convenience implementation of authorization support that space providers can use if there are no special needs. =Storing Authorization Information=
    4 KB (646 words) - 12:17, 20 January 2008
  • ...yuser'' and ''proxypassword'' can be removed if your proxy doesn't require authorization.
    10 KB (1,455 words) - 05:27, 13 December 2010
  • * proxyuser - authorized user for proxy; only if proxy requires authorization * proxypassword - password for proxy user; only if proxy requires authorization
    8 KB (1,217 words) - 17:31, 24 November 2006
  • ** committer information (including authorization or role where applicable) * '''SHOULD''' support modification of developer authorization/roles
    20 KB (2,817 words) - 17:46, 1 February 2012
  • * [[Spaces/Authorization Support]] - description of how to work with authorization
    2 KB (344 words) - 03:30, 6 March 2008
  • *Paul – The way he was thinking of doing this, .. 1.0 doesn’t address authorization, but we could build this in *Mike – There is an underlying assumption of authorization happening based on the identity we are asserting. This is a fundamental as
    25 KB (4,057 words) - 17:56, 3 May 2007
  • *** What if there are other authorization problems?
    6 KB (848 words) - 10:44, 21 August 2007
  • **** ID 55 Develop Authentication/Authorization Module 100% **** ID 56 Integrate Authentication/Authorization Module 75%
    5 KB (794 words) - 21:48, 9 April 2007
  • ...y has been a known open issue. We will need to build our authentication / authorization model based upon Higgins identity management. Corona plans to address secu
    7 KB (985 words) - 11:38, 17 April 2007
  • Authorization level
    15 KB (2,196 words) - 09:48, 30 April 2007
  • * Authorization service ** another specialization of an STS; ask for authorization claim values
    15 KB (2,324 words) - 19:03, 26 June 2007
  • The <b><u>authorization subsystem</u></b> is responsible for <u>enforcing</u> a policy based on a p ...e with the defined authorization policy. If a bundle is disabled due to an authorization failure, the widget will throb a yellow or red shield, depending on the sev
    10 KB (1,495 words) - 18:54, 9 January 2008
  • ....eclipse.core.runtime.compatibility.auth/about.html?view=co about for the Authorization Compatibility plug-in] for an example of this.
    3 KB (529 words) - 22:19, 20 June 2007
  • ...nerated SQL'' setting, and they will be able to specify whether the curent Authorization ID should be used as the current schema or enter the current schema name by :- ''Use authorization ID as current schema''. This says that the current authorization ID should be used as the current schema.
    6 KB (1,059 words) - 11:31, 27 September 2007
  • ...a security providers, trust roots, user authentication and on runtime code authorization. ** Security and provisioning. Authentication and authorization (JAAS) are necessary for a controlled provisioning (governance). Trusted co
    13 KB (2,021 words) - 04:39, 25 September 2007
  • ** Equinox working on Authentication and Authorization with pluggable authentication modules based on [http://en.wikipedia.org/wik
    9 KB (1,316 words) - 05:04, 18 July 2007
  • {{CommentBox|This is now implemented as a Space URI, and Spaces handles authorization information for spaces. }}
    18 KB (2,928 words) - 19:24, 20 January 2008
  • ...a security providers, trust roots, user authentication and on runtime code authorization.
    4 KB (626 words) - 13:46, 26 September 2007
  • ...nerated SQL'' setting, and they will be able to specify whether the curent Authorization ID should be used as the current schema or enter the current schema name by :- ''Use authorization ID as current schema''. This says that the current authorization ID should be used as the current schema.
    6 KB (1,059 words) - 11:34, 27 September 2007
  • ===Authentication and Authorization=== *Ties into authorization discussion.
    7 KB (1,031 words) - 14:09, 12 October 2007
  • == Authorization, Access Control ==
    6 KB (808 words) - 16:36, 25 April 2011
  • ...ile service and security in these areas. Working on an authentication and authorization theme. Doing the workflow. Would like a minimal Node Orion file service.
    2 KB (295 words) - 16:13, 16 July 2012
  • ...ation for the User to make an informed decision regarding registration and authorization of the XRDS Provider, the ISAP Provider, and the IA Provider.
    7 KB (1,070 words) - 16:30, 12 December 2007
  • ...n-centric authorization grouping of users (while group is a resource-based authorization grouping of accounts). # Authorization
    5 KB (735 words) - 14:56, 15 January 2008
  • ...authorization mechanism can easiliy be extended later, to allow for other Authorization schemes. ** An implementor of a new authorization scheme must add an extension point to their headless space provider plugin
    19 KB (3,221 words) - 16:53, 21 January 2008
  • IdAS provides APIs to access identity attributes, but currently ignores authorization in terms of defining an access control model, defining management APIs, and ...de access to backing data stores which themselves incorporate some kind of authorization model, but these vary widely in capabilities and model.
    10 KB (1,541 words) - 15:11, 18 July 2009
  • === How COSMOS enables authentication / authorization / encryption for its Web UI === === How COSMOS enables authentication / authorization / encryption for embedded-approach adopters ===
    1 KB (167 words) - 17:47, 28 May 2008
  • ...er in the backing store as a sufficiently privileged user and then use the authorization characteristics of that user for all subsequent requests.
    9 KB (1,438 words) - 12:56, 24 January 2010
  • Security has many aspects. This document addresses authentication, authorization and session handling. Not included are SSL certificates or encryption in an ...already provides a good set of classes for dealing with authentication and authorization
    4 KB (683 words) - 03:49, 8 July 2011
  • ** Authorization query method? e.g. "boolean isAllowed(URI attributeType, <operation>)"
    3 KB (426 words) - 18:38, 28 October 2009
  • ...have attributes such as priority, funding/ccn, user community, complexity, authorization, and etc that can be set independently of workflows that are part of the go
    554 bytes (88 words) - 12:58, 8 May 2009
  • authorization properties.
    6 KB (1,015 words) - 07:58, 17 April 2008
  • ...or executing code. Not talking here about security holes, authentication, authorization etc
    26 KB (4,032 words) - 17:15, 19 May 2008
  • ...on in multiple phases. This overall solution will address Authentication, Authorization, and Encryption at the MDR, Broker, and UI/Client level. There is also a s
    3 KB (391 words) - 16:00, 16 May 2008
  • We need an implementation that supports authentication ONLY (no authorization, encryption is nice to have). One of our initial adopter products has a we
    15 KB (2,077 words) - 10:05, 23 May 2008
  • *org.remotercp.domain.authorization *org.remotercp.domain.authorization
    6 KB (910 words) - 07:20, 11 July 2011
  • #* There were use cases described that moved beyond simply using cards for authorization. These cases involved the user granting permission for service A to consume
    7 KB (1,068 words) - 21:42, 7 July 2008
  • ** some refactoring for authorization were done
    71 KB (10,112 words) - 06:43, 12 June 2012
  • ...and the pluggable security concept that can be used for authentication and authorization.
    16 KB (2,377 words) - 04:21, 15 August 2015
  • ==== SensiNact APT Repository key authorization ====
    7 KB (1,032 words) - 11:11, 23 February 2024
  • * Matt looking for scenerios and people to talk to about authentication and authorization in the server-side space
    2 KB (355 words) - 14:58, 23 September 2008
  • ...pse.org/forums/index.php?t=msg&th=164519 Authentication OK, but what about authorization] ...ategory:EMF]] [[Category:Authentication]] [[Category:Security]] [[Category:Authorization]]
    4 KB (518 words) - 02:31, 26 May 2011
  • ...transferred from the data sources into SMILA's indices and used there for authorization each time a user sends a query.
    10 KB (1,524 words) - 17:26, 10 October 2008
  • * Matt is starting security UI work in M4. Eric is starting authorization API work in M4
    485 bytes (69 words) - 14:21, 28 October 2008
  • ...elector application should pass the Access Token Identifier by using http "Authorization" header according to the following format. <code>Authorization: HWS <Access Token Identifier></code>
    3 KB (468 words) - 02:14, 30 July 2009
  • This page is about Security in SMILA (Authorization). Records may be associated with security information, services may use sec ...hip of users to groups must be resolvable using external DSSP services for authorization, for identification a connection to the DSSPs user/password system must be
    25 KB (4,089 words) - 12:32, 11 March 2011
  • # For authentication and authorization against the AWS web services, g-Eclipse uses the '''Access Key ID''' and th
    6 KB (893 words) - 12:28, 13 October 2009
  • ** provisional authorization API used to establish trust based on context and content ...l get a patch in order with some suggested code changes to the provisional authorization API. We will not plan on graduating the API in 3.5
    1 KB (227 words) - 16:04, 24 February 2009
  • |width="10*" | Centralized Authentication and Authorization. See User Stories: [[Swordfish_Documentation:_User_Stories:_Service_Develop
    9 KB (1,023 words) - 04:01, 3 June 2009
  • * Discuss provisional authorization APIs [https://bugs.eclipse.org/bugs/show_bug.cgi?id=266554 bug 266554] ...rg/bugs/show_bug.cgi?id=266888 bug 266888] without having to use or change authorization API?
    791 bytes (126 words) - 15:41, 3 March 2009
  • Authorization on operation level.
    4 KB (615 words) - 08:07, 27 March 2009
  • Authentication and Authorization How can an Authentication and Authorization Concept also be applied to this ‘local’ configuration?
    3 KB (364 words) - 08:08, 27 March 2009
  • [[Jetty/Feature/JAAS|Java Authentication and Authorization Service (JAAS)]]<br/>
    13 KB (1,809 words) - 03:34, 2 July 2013
  • ...dfish_Documentation:_Product_Backlog#0300 | Centralized Authentication and Authorization]] |width="10*" | I want to use policy controled '''authorization''',
    15 KB (1,890 words) - 02:53, 3 June 2009
  • This page is about Security in SMILA (Authorization). Records may be associated with security information, services may use sec
    11 KB (1,609 words) - 05:09, 16 January 2012
  • ...dfish_Documentation:_Product_Backlog#0300 | Centralized Authentication and Authorization]] ...dfish_Documentation:_Product_Backlog#0300 | Centralized Authentication and Authorization]]
    13 KB (1,567 words) - 04:03, 3 June 2009
  • * authorization - some can fully manage the system while others can only monitor its state
    5 KB (870 words) - 14:16, 24 April 2009
  • ...s AccessToken.Id by using authorization http header with prefix HWS <code>"Authorization: HWS <Access Token Identifier>"</code>.
    6 KB (813 words) - 11:04, 6 July 2009
  • ...ed to transition back to the "Analyze" state from the "Authorize" state if authorization failed and more analysis is needed.
    18 KB (2,922 words) - 17:48, 14 September 2016
  • When configuring BaSyx application using the authorization feature backend, always put the prefix "basyxsecurity_" at begin of an envi | authorization.strategy
    9 KB (997 words) - 05:41, 4 October 2023
  • * [[/JAAS|Java Authentication and Authorization Service (JAAS)]]
    4 KB (419 words) - 01:44, 3 August 2012
  • '''2. On the first login GerritHub requests authorization for read access to GitHub'''.
    79 KB (12,107 words) - 07:16, 4 December 2023
  • *Allows remote de-authorization of selectors ...encrypted using auth service's certificate and http Authorization header (Authorization: HWS &lt;session_token&gt;)
    20 KB (2,869 words) - 11:02, 23 May 2010
  • authorization to change the abstract of a bug (that is, you didn't open it) then you will
    3 KB (578 words) - 13:32, 3 May 2011
  • '''Note''':<code>When trying to access your Server, with authorization enabled, from an external source, you have to set up HTTPS. You can find a === Restricting access via Authorization ===
    2 KB (316 words) - 02:33, 16 September 2022
  • *<u>''Continue without authorization code''</u> creates the account in the "non-serialized" mode (does not requi *'''Authorization Code''' is the OTP sent to the user
    7 KB (1,136 words) - 14:25, 11 May 2010
  • * IBM got their unpacking authorization and are getting it set up.
    3 KB (577 words) - 17:19, 5 November 2009
  • ...several ways. For a complete tutorial about controlling authentication and authorization in JMX, see [https://blogs.oracle.com/lmalventosa/entry/jmx_authentication_
    7 KB (1,011 words) - 14:03, 23 April 2013
  • When a request to a web application requires authentication or authorization, Jetty will use the &lt;realm-name&gt; sub-element inside &lt;login-config&
    2 KB (295 words) - 15:26, 23 April 2013
  • This LoginService is a simple realm whose authentication and authorization information is stored in a properties file. Each line in the file contains See [[Jetty/Tutorial/JAAS|Java Authentication and Authorization Service (JAAS)]] tutorial for additional information about configuring secu
    7 KB (956 words) - 15:02, 1 March 2012
  • * for authorization of users to ensure they have the access control rights (permissions) requir * a policy for role-based authorization (Default: org.eclipse.jetty.plus.jaas.StrictRoleCheckPolicy)
    16 KB (2,289 words) - 13:46, 30 April 2013
  • * A policy for role-based authorization (Default: <tt>org.eclipse.jetty.plus.jaas.StrictRoleCheckPolicy</tt>). ...rpose is to help answer the question "is User X in Role Y?" for role-based authorization requests. The default implementation distributed with Jetty is the <tt>org.
    18 KB (2,468 words) - 13:45, 30 April 2013
  • String h=req.getHeader("Authorization");
    23 KB (2,805 words) - 21:24, 9 May 2013
  • * PMC component ownership x bugzilla pmc authorization
    25 KB (4,129 words) - 11:56, 17 February 2010
  • conn.setRequestProperty("Proxy-Authorization", "Basic " + encoded); ...portant to know the difference between the two terms "Authentication" and "Authorization".
    43 KB (6,274 words) - 15:37, 1 November 2011
  • The endpoints publishing this data will be protected via an authorization/access control mechanism; two proposed alternatives are [http://tools.ietf.
    12 KB (1,813 words) - 00:55, 18 April 2011
  • *Authentication/Authorization (not yet implemented; see [https://bugs.eclipse.org/bugs/show_bug.cgi?id=31
    3 KB (476 words) - 01:04, 29 July 2011
  • ...andlers. For example, the security handler only applies authentication and authorization to REQUEST dispatches.
    8 KB (1,212 words) - 15:11, 23 April 2013
  • by setting the Authorization header.
    2 KB (225 words) - 22:28, 29 November 2023
  • ...ta in that app, but not any other data in the ADS. Put your API key in the authorization header. Example: 98ea3b193ed2fa804ebbef4fb2391cac. Authorization: Ugb2YgYW55IGNhcm5hbCBwbGVhc3VyZS4=
    5 KB (865 words) - 14:25, 16 November 2010
  • Remote Services Authorization - 2
    1 KB (226 words) - 07:27, 5 July 2012
  • * Simon - Looking at core architecture for deployment. Looking at authorization problem, asking Persona folks for some help. Looked at Content Security Po
    3 KB (525 words) - 15:40, 8 November 2012
  • ...ht HTTP and JSON as a request/response format. Support open authentication/authorization technologies (OpenID, OAuth, SSL, standard W3C validation, etc).
    6 KB (1,100 words) - 20:29, 1 February 2011
  • ...erver (registers servlets and static content, specifies authentication and authorization settings)
    12 KB (1,760 words) - 11:30, 5 July 2017
  • == Authorization == ...uthorization system based entirely on request URIs. User names are granted authorization for a given URI prefix, which allows GET/PUT/POST operations on any service
    2 KB (338 words) - 12:02, 4 November 2011
  • | '''Authorization/Authentication'''
    6 KB (803 words) - 16:15, 4 May 2011
  • ...ed to be [https://github.com/settings/applications/new registered] and the Authorization callback URL needs to be [https://developer.github.com/v3/oauth/#redirect-u This will automatically set the Authorization callback URL to the same value.
    32 KB (5,060 words) - 13:25, 21 October 2015
  • * Brian P. was able to get authorization to go to EclipseCon this year. Yah! Charles said he will look into going,
    2 KB (334 words) - 16:03, 16 February 2011
  • ...NAME}}/{{SUBPAGENAME}}/Minicrm/Permissions|Permissions: Authentication and Authorization]]|This tutorial builds upon the application created in the tutorial above.
    3 KB (404 words) - 12:15, 22 April 2013
  • ...or GMF based editors || Dawn should re-implemented the authentification/authorization for GMF based diagrams. User rights should be limited to read/write access
    5 KB (685 words) - 07:20, 29 July 2011
  • * Authorization
    297 bytes (32 words) - 05:57, 9 December 2013
  • == Configuring Authorization == Skalli's authorization concept is based on so-called '''permits''' that are related to REST resour
    111 KB (16,469 words) - 09:39, 31 March 2015
  • ...ted data, a way to manage authorizations (e.g. using something like an UMA Authorization Manager) and set policies under which 3rd parties (e.g. apps) gain access t
    5 KB (825 words) - 14:52, 24 August 2011
  • ** Exploring related authentication scenarios, cross-site authorization
    2 KB (233 words) - 12:55, 7 April 2011
  • Note&nbsp;: In reality, you should have the authorization of the PMC before doing this commit.
    17 KB (2,523 words) - 08:26, 9 May 2023
  • *Authorization should be done to complete the push. You should use the committer password
    12 KB (2,071 words) - 22:14, 3 October 2022
  • ...ccount getting corrupted by a User preference. Cleaning up authentication/authorization issue.
    2 KB (312 words) - 10:43, 30 September 2014
  • ...ve with Secure Storage support, secure data is automatically migrated from Authorization database, so you don't need to reenter it manually.
    5 KB (775 words) - 04:48, 19 May 2013
  • * Allow admin to change authorization settings (currently vi users.xml)
    4 KB (550 words) - 14:14, 27 June 2011
  • # Local reverse proxy authorization override # Local reverse proxy authorization override
    8 KB (1,141 words) - 12:14, 18 August 2011
  • ...tardust.docs.dev/html/handbooks/modelling/property-page-authorization.html Authorization]]
    7 KB (890 words) - 02:05, 16 September 2015
  • throw new VetoException("Authorization failed"); throw new VetoException("Authorization failed");
    9 KB (1,315 words) - 05:39, 4 May 2012
  • @HeaderParam("Authorization") String kerberosToken) throws GSSException { get.setRequestHeader("Authorization", theClientCred);
    29 KB (3,958 words) - 03:49, 19 March 2012
  • ...mpanyForm_3.png]. Uncheck all permissions as {{ScoutLink|Concepts|Security|Authorization}} is not part of this tutorial.
    8 KB (1,025 words) - 03:55, 24 April 2012
  • ...WsLogForm_3.png]. Uncheck all permissions as {{ScoutLink|Concepts|Security|Authorization}} is not part of this tutorial. As the WS log is read-only, also uncheck <c
    6 KB (870 words) - 02:56, 17 October 2012
  • ...or use -Xauthfile to give the authorization file and on each line provide authorization information using this format : http[s]://user:password@host:port//<url-pat
    2 KB (258 words) - 02:56, 17 October 2012
  • ...or use -Xauthfile to give the authorization file and on each line provide authorization information using this format : http[s]://user:password@host:port//<url-pat
    2 KB (225 words) - 07:06, 24 May 2012
  • *Finish up the remaining work around security and authorization to have a first 0.5 release with the full telemetry implementation ready in ...without interfering too much with each other. It’s closely connected to authorization and connection and that is already implemented, but I would like to wait un
    32 KB (5,050 words) - 10:14, 12 March 2018
  • ...mple portal configuration. Before you implement this approach check if the Authorization Manager in the Administration Perspective already covers your requirements.
    10 KB (1,122 words) - 22:44, 12 August 2013
  • The new system will use LDAP for user authentication and for some aspects of authorization. This implementation will be based on work being done in {{Bug|364605}} tha ...rupal authentication via Drupal "organic groups" functionality. Additional authorization schemes are required to handle PMC-access to projects and other corner case
    5 KB (630 words) - 16:25, 17 April 2012
  • throw new VetoException("Authorization failed");
    10 KB (1,440 words) - 08:38, 7 May 2012
  • ==== Authorization ==== Currently only key-based authorization is supported in the Gyrex bundled SSH console. Also, the OSGi SSH console d
    3 KB (426 words) - 09:51, 23 April 2013
  • ...ond part is, synchronizing users along with their properties. And third is authorization of the users from external user repository. Even, there is forth part, appl Security.Authorization.SynchronizationProvider = com.sungard.user.repo.PropertiesFileBasedDynamicP
    5 KB (665 words) - 08:15, 11 May 2012
  • =Authorization and authentication=
    3 KB (413 words) - 13:36, 24 July 2012
  • ...Plugin.js being renamed to pluginprovider.js. Adding some exceptions to authorization and licensing. Adding disabled plugins (think NonNLS plugin). Should be a
    3 KB (483 words) - 14:05, 27 September 2012
  • This chapter is about authorization and authentication.
    21 KB (2,675 words) - 05:33, 19 April 2013
  • # '''Authorization Strategy''', which determines who has access to what. ...realm, and you might choose "everyone full access once logged in" mode for authorization strategy. Or you might choose to let Hudson run its own user database, and
    3 KB (442 words) - 08:06, 11 July 2014
  • * If you are using an authorization token to trigger the builds (Job \-> Configure \-> 'Build Triggers' \-> 'Tr
    4 KB (592 words) - 07:59, 11 July 2014
  • # Local reverse proxy authorization override # Local reverse proxy authorization override
    7 KB (1,086 words) - 13:43, 3 January 2013
  • Controls authorization throughout Hudson.
    16 KB (2,101 words) - 18:38, 14 January 2013
  • *Authorization: Once user is added, provide access authorization to the users as follows
    23 KB (3,333 words) - 19:08, 22 May 2013
  • ** Includes a web app with administrative and delegated authorization UIs
    2 KB (209 words) - 14:12, 13 February 2013
  • ...ement in Hudson is to implement team based authorization so that different authorization scheme can be assigned to each team. This helps multiple software project t ...nce will have at least one Sys Admin. Each Sys Admin will have Hudson wide authorization. Some of the main responsibilities are<br>
    22 KB (3,662 words) - 17:49, 11 June 2014
  • String h = req.getHeader("Authorization");
    10 KB (1,141 words) - 03:30, 12 March 2013
  • ...NAME}}/{{SUBPAGENAME}}/Minicrm/Permissions|Permissions: Authentication and Authorization]]|This tutorial builds upon the application created in the tutorial above.
    3 KB (425 words) - 07:44, 4 June 2014
  • ...or use -Xauthfile to give the authorization file and on each line provide authorization information using this format : http[s]://user:password@host:port//<url-pat
    2 KB (225 words) - 02:37, 2 April 2013
  • ...or use -Xauthfile to give the authorization file and on each line provide authorization information using this format : http[s]://user:password@host:port//<url-pat
    2 KB (258 words) - 13:15, 21 August 2013
  • Uncheck all permissions as {{ScoutLink|Concepts|Security|Authorization}} is not part of this tutorial.
    7 KB (888 words) - 13:47, 21 August 2013
  • Uncheck all permissions as {{ScoutLink|Concepts|Security|Authorization}} is not part of this tutorial. As the WS log is read-only, also uncheck <t
    6 KB (784 words) - 02:39, 22 August 2013
  • String h=req.getHeader("Authorization");
    22 KB (2,784 words) - 07:32, 10 June 2013
  • This chapter is about authorization and authentication.
    21 KB (2,712 words) - 09:44, 14 February 2014
  • This chapter is about authorization and authentication.
    22 KB (2,793 words) - 02:12, 2 October 2014
  • ...NAME}}/{{SUBPAGENAME}}/Minicrm/Permissions|Permissions: Authentication and Authorization]]|This tutorial builds upon the application created in the tutorial above.
    3 KB (453 words) - 04:20, 10 September 2014
  • == Adding Team Based Authorization == '''Note:''' Before setting up the Authorization scheme, add the Security Realm to Hudson and makes sure the user authentica
    8 KB (1,292 words) - 16:56, 11 June 2014
  • throw new VetoException("Authorization failed");
    10 KB (1,440 words) - 02:21, 2 July 2013
  • String h = req.getHeader("Authorization");
    10 KB (1,141 words) - 03:04, 2 July 2013
  • String h = req.getHeader("Authorization");
    23 KB (2,788 words) - 08:45, 27 May 2014
  • ...NAME}}/{{SUBPAGENAME}}/Minicrm/Permissions|Permissions: Authentication and Authorization]]|This tutorial builds upon the application created in the tutorial above.
    3 KB (471 words) - 16:09, 14 August 2015
  • ...aching patch, reviewing etc. Workflow also manages the IP as well. Checks authorization for committers as well. Interface for review is a collaborative environment
    8 KB (1,084 words) - 23:23, 13 August 2013
  • Controls authorization throughout Hudson.
    10 KB (1,340 words) - 15:31, 27 August 2013
  • ...BaSyx_/_Documentation_/_Components_/_Registry_/_Features_/_Authorization | Authorization]]
    1 KB (102 words) - 06:23, 2 January 2023
  • authorization to change the abstract of a bug (that is, you didn't open it) then the requ
    3 KB (532 words) - 15:37, 26 September 2013
  • ...secure collaborative development. As a previous step, User Management and Authorization facilities need to be integrated into Papyrus. We focus here in Role-based
    3 KB (450 words) - 07:04, 14 February 2017
  • A dummy authorization scheme can be configured using the following recipe. This will create an authorization rule that will simply allow all actions.
    1 KB (195 words) - 06:20, 23 June 2014
  • ...equest, get the username and password to include, encrypt and put into the Authorization header. [https://github.com/ECF/JaxRSProviders/tree/master/examples/org.ec private static final String AUTHORIZATION_PROPERTY = "Authorization";
    12 KB (1,517 words) - 22:21, 17 January 2021
  • =Authentication and Authorization= ...With an account, a user can log into any Eclipse Foundation-managed forge. Authorization is managed within the forges via relationships defined in the [[Project Man
    5 KB (680 words) - 16:53, 1 February 2022
  • but only if the host responds with authorization request.
    74 KB (11,394 words) - 06:31, 1 November 2023
  • ...ers management, synchronous and asynchronous communications, access rights authorization, groups organisation, re-targeting, etc.
    5 KB (737 words) - 07:53, 5 August 2016
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx Authorization: Basic xxxxxxxxxxxxxxxxxxx
    6 KB (665 words) - 06:02, 4 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx
    4 KB (416 words) - 05:14, 20 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx Authorization: Basic xxxxxxxxxxxxxxxxxxx
    9 KB (1,054 words) - 05:04, 20 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx Authorization: Basic xxxxxxxxxxxxxxxxxxx
    9 KB (1,102 words) - 04:38, 20 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx Authorization: Basic xxxxxxxxxxxxxxxxxxx
    4 KB (571 words) - 05:03, 20 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx
    4 KB (475 words) - 04:44, 20 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx Authorization: Basic xxxxxxxxxxxxxxxxxxx
    5 KB (566 words) - 04:50, 20 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx Authorization: Basic xxxxxxxxxxxxxxxxxxx
    7 KB (916 words) - 04:45, 20 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx
    2 KB (225 words) - 05:12, 20 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx Authorization: Basic xxxxxxxxxxxxxxxxxxx
    6 KB (701 words) - 05:12, 20 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx
    3 KB (379 words) - 05:11, 20 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx Authorization: Basic xxxxxxxxxxxxxxxxxxx
    4 KB (476 words) - 08:25, 4 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx
    3 KB (373 words) - 05:01, 20 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx Authorization: Basic xxxxxxxxxxxxxxxxxxx
    13 KB (1,593 words) - 18:43, 3 June 2015
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx
    5 KB (486 words) - 04:46, 20 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx Authorization: Basic xxxxxxxxxxxxxxxxxxx
    6 KB (776 words) - 05:08, 20 May 2014
  • * Request Headers: Authorization, Accept. Authorization: Basic xxxxxxxxxxxxxxxxxxx
    6 KB (766 words) - 06:05, 4 May 2014
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx
    4 KB (467 words) - 04:42, 20 May 2014
  • * [https://bugs.eclipse.org/bugs/show_bug.cgi?id=338048 Bug 338048] - http authorization fails
    684 bytes (105 words) - 22:13, 29 November 2023
  • * [https://bugs.eclipse.org/bugs/show_bug.cgi?id=338048 Bug 338048] - http authorization fails
    569 bytes (86 words) - 22:32, 29 November 2023
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx
    2 KB (257 words) - 04:45, 20 May 2014
  • ...Client username/password must be encoded to base64 then entered as a Basic Authorization header. You can use www.base64encode.org for base64 encryption. e.g. base64 | Header|| Authorization: Basic YWRtaW4vYWRtaW4=
    6 KB (846 words) - 11:36, 20 April 2014
  • ...Client username/password must be encoded to base64 then entered as a Basic Authorization header. You can use www.base64encode.org for base64 encryption. e.g. base64 | Header|| Authorization: Basic YWRtaW46YWRtaW4=
    9 KB (1,281 words) - 11:42, 27 November 2014
  • Uncheck all permissions as {{ScoutLink|Concepts|Security|Authorization}} is not part of this tutorial.
    7 KB (888 words) - 13:09, 20 April 2014
  • Uncheck all permissions as {{ScoutLink|Concepts|Security|Authorization}} is not part of this tutorial. As the WS log is read-only, also uncheck <t
    6 KB (784 words) - 13:12, 20 April 2014
  • ...or use -Xauthfile to give the authorization file and on each line provide authorization information using this format : http[s]://user:password@host:port//<url-pat
    2 KB (258 words) - 13:42, 20 April 2014
  • ...well as product and product version. We use this scheme partly for proper authorization and partly for organization. The management side is not that difficult but
    14 KB (2,535 words) - 11:56, 4 November 2015
  • Authorization: Basic xxxxxxxxxxxxxxxxxxx Authorization: Basic xxxxxxxxxxxxxxxxxxx
    10 KB (1,230 words) - 16:52, 4 May 2014
  • ...er side refactoring, reduced dependencies on authentication. But there is authorization. In our war file trying to remove Jetty tag along. Also looking at sessio
    3 KB (425 words) - 12:04, 15 May 2014
  • A dummy authorization scheme can be configured using the following recipe. This will create an authorization rule that will simply allow all actions.
    2 KB (324 words) - 07:15, 23 June 2014
  • This chapter is about authorization and authentication.
    22 KB (2,816 words) - 04:31, 2 September 2015
  • * Implementation of Dynamic Authorization features as defined to oneM2M standard. * Dynamic Authorization
    9 KB (1,217 words) - 06:32, 12 February 2021
  • ...business process of a web shop is presented, see the image below. After ''authorization'' (i.e. the user is signed in) the request can be either about ''purchasing
    9 KB (1,362 words) - 08:16, 1 April 2015
  • String h = req.getHeader("Authorization");
    23 KB (2,788 words) - 06:24, 30 March 2015
  • Uncheck all permissions as {{ScoutLink|Concepts|Security|Authorization}} is not part of this tutorial.
    7 KB (888 words) - 04:15, 31 March 2015
  • Uncheck all permissions as {{ScoutLink|Concepts|Security|Authorization}} is not part of this tutorial. As the WS log is read-only, also uncheck <t
    6 KB (784 words) - 05:20, 31 March 2015
  • ...or use -Xauthfile to give the authorization file and on each line provide authorization information using this format : http[s]://user:password@host:port//<url-pat
    1 KB (172 words) - 06:57, 31 March 2015
  • String h = req.getHeader("Authorization");
    10 KB (1,144 words) - 09:00, 8 April 2015
  • * Asserts client identity and authorization to connect * Authentication? authorization?
    15 KB (2,066 words) - 10:22, 27 November 2015
  • throw new VetoException("Authorization failed");
    10 KB (1,440 words) - 09:28, 10 April 2015
  • *LfsProtocolServlet: Pass HTTP Authorization header to getLargeFileRepository *Add support for refusing LFS request due to invalid authorization
    3 KB (376 words) - 22:36, 29 November 2023
  • ...ndow -> Preferences -> Docker -> Registry Accounts]]. This is needed when authorization is required ...ry for the specified repo. Using the aforementioned tag method assumes no authorization
    34 KB (5,296 words) - 15:51, 20 October 2017
  • With an OAuth2 client and a highly customizable HTTP authentication/authorization module the framework now supports a wide range of security aspects. Basic H
    4 KB (633 words) - 05:48, 30 October 2018
  • You can add authorization requirements to the actions of BaSyx components that would be subject to th ...ree/main/basyx.examples/src/main/java/org/eclipse/basyx/examples/scenarios/authorization/combined Examples].
    30 KB (3,594 words) - 05:34, 9 November 2023
  • ...ose components can consume data and control devices that have been granted authorization by the device owner. In this regard the IoT Connector can be considered an * managing authorization information per topics
    12 KB (1,768 words) - 04:56, 6 January 2016
  • ...d implementing a few basic APIs. Covering the aspect of authentication and authorization. Providing a few automated unit tests for the API. Optionally providing a c
    31 KB (4,893 words) - 10:46, 11 April 2016
  • ...ers management, synchronous and asynchronous communications, access rights authorization, groups organisation, re-targeting, etc.
    5 KB (708 words) - 06:58, 16 June 2018
  • ...not hidden, and may even be used in source code. It is not meant to be an authorization or authentication mechanism; however, there are plans to increase the secur ...cki.com/oauth-2-simplified/ OAuth] to allow the user to grant fine-grained authorization for a specific Eclipse project to access their user data. Each Eclipse pro
    6 KB (866 words) - 14:06, 5 April 2021
  • ...Working Group recognizes the need to provide user authentication and user authorization as part of the openMDM 5 framework and solicits proposals for the design an * How should openMDM components and applications react to authorization failures?
    2 KB (326 words) - 12:48, 11 December 2017
  • === Authorization === The requirement list given in Section 3.2 (Objectives - User Authorization) of the Offer
    7 KB (1,068 words) - 07:14, 11 January 2017
  • #REDIRECT [[BaSyx / Documentation / Components / Security / Authorization]]
    75 bytes (6 words) - 05:55, 20 July 2022
  • == JWT Based Authentication and Authorization 1.0 == ...//tools.ietf.org/html/rfc7519 JSON Web Tokens(JWT)] for authentication and authorization of MicroService requests.
    2 KB (242 words) - 14:20, 26 January 2024
  • p.s. It is not necessary to pair the Lamp if you re-start sensiNact, the authorization key is stored in the hard disk as a Java Preferences, or as a plain text fi
    2 KB (375 words) - 08:16, 26 February 2024
  • ...management leverages oneM2M Access Control Policy management and a Dynamic Authorization System. T-Labs and Orange Labs are contributing to Eclipse IoT projects, es
    19 KB (2,612 words) - 18:32, 17 January 2024
  • ...me process. This is similar to handover or takeover. But it simplifies the authorization.
    18 KB (3,108 words) - 11:36, 25 May 2021
  • * Rule-based Authorization (see example project) ** Adds support for authorization
    8 KB (979 words) - 03:48, 5 February 2024
  • * Turn ON OAuth 2.0 Device Authorization Grant Enabled * Turn ON Authorization Enabled
    7 KB (881 words) - 08:54, 25 May 2023

Back to the top