...
- Authentication answers the question "who is the person, and how do I verify that they are who they say they are?" Fedora 4 relies on the web servlet container to answer this question.
- Authorization answers the question, "does this person have permission to do what they want to do?". Fedora 4 provides four two different ways to answer this question:
- Bypass authorization. : Anyone who has authenticated through the web application container (Tomcat, Jetty, WebSphere, etc.) has permission to do everything – in effect all, authenticated users are superusers.
- WebAC authorizations. authorization: Authenticated users' access to resources is mediated by WebAC Access Control Lists stored in the repository.
...
Include Page | ||||
---|---|---|---|---|
|
WebAC Authorization
...
Include Page | Authorization Delegates | Authorization Delegates |
---|
...
|