...
The potential delegation of AuthN/Z responsibility from Hydra to Fedora 4 is captured in the following use cases.
Title (Goal) | Use the hierarchical node structure to manage access controls on deeply nested resources |
---|---|
Primary Actor | |
Scope | |
Level | |
Story (A paragraph or two describing what happens) | I have a complex structure of objects with more than two levels of hierarchy – A is parent of B, which is parent of C – and I want the access controls on A to govern access to C without having to create an explicit relationship between A and C. |