ace-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From ma...@apache.org
Subject svn commit: r1330179 - /ace/site/trunk/content/dev-doc/design/ace-authentication.mdtext
Date Wed, 25 Apr 2012 09:58:39 GMT
Author: marrs
Date: Wed Apr 25 09:58:38 2012
New Revision: 1330179

URL: http://svn.apache.org/viewvc?rev=1330179&view=rev
Log:
Fixed a typo.

Modified:
    ace/site/trunk/content/dev-doc/design/ace-authentication.mdtext

Modified: ace/site/trunk/content/dev-doc/design/ace-authentication.mdtext
URL: http://svn.apache.org/viewvc/ace/site/trunk/content/dev-doc/design/ace-authentication.mdtext?rev=1330179&r1=1330178&r2=1330179&view=diff
==============================================================================
--- ace/site/trunk/content/dev-doc/design/ace-authentication.mdtext (original)
+++ ace/site/trunk/content/dev-doc/design/ace-authentication.mdtext Wed Apr 25 09:58:38 2012
@@ -5,7 +5,7 @@ last updated: April 24th, 2012
 
 ## Introduction
 
-When provisioning software (partly) to targets, one has to rely upon the trustworthiness
of both the network and the target. Even if everything is under your control and governance,
one cannot entirely be sure that unwanted access takes place. A first step in order to prevent
unwanted access is *authentication*, which gives you the ability to verify the identity of
someone. Once the identity is known, one can apply *authentication* in order to determine
what actions are allowed and which are not.
+When provisioning software (partly) to targets, one has to rely upon the trustworthiness
of both the network and the target. Even if everything is under your control and governance,
one cannot entirely be sure that unwanted access takes place. A first step in order to prevent
unwanted access is *authentication*, which gives you the ability to verify the identity of
someone. Once the identity is known, one can apply *authorization* in order to determine what
actions are allowed and which are not.
 In this article, the recently added authentication layer of ACE is explained in more depth,
and some details on how extensions can be written for additional mechanisms are given. The
remainder of this article assumes the reader has basic knowledge of the principles behind
ACE, and has sufficient programming skills. For this article, the latest code of ACE (0.8.1-SNAPSHOT,
rev.1329269) was used.
 
 



Mime
View raw message