Information Technology Reference
In-Depth Information
We now have a means of enforcing coarse-grained access control through
IAM. If the interceptor does not find the specific attribute it is looking for, it
means the user is not authorised to access the application. It can then either
display a suitable error message, or it can pass the request through to the
application (with the expected attribute missing), so that the application can
perform a similar check and provide a gracefully degraded level of
functionality (e.g., “guest” access).
Search WWH ::




Custom Search