Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Authentication answers the question "who is the person, and how do I verify that they are who they say they are?"  Fedora 4 relies on the web servlet container to answer this question.
  • Authorization answers the question, "does this person have permission to do what they want to do?".  Fedora 4 provides four two different ways to answer this question:
    • Bypass authorization: Anyone who has authenticated through the web application container (Tomcat, Jetty, WebSphere, etc.) has permission to do everything – in effect all, authenticated users are superusers.
    • WebAC authorizations. authorization: Authenticated users' access to resources is mediated by WebAC Access Control Lists stored in the repository.

...

Include Page
How To Bypass Authorization
How To Bypass Authorization

WebAC Authorization

...

Include Page
Authorization DelegatesAuthorization Delegates

...

Web Access Control
Web Access Control