Basic HTML version of Foils prepared
26 March 99
Foil 15 Privilege Delegation
From
Overview of Security Proposals for Gateway Project Security Meeting ASC --
15 March 99
.
by
Tom Haupt
No delegation
The intermediary uses its own credentials
Simple delegation
The intermediary impersonates the client
Composite delegation
The intermediary uses both
Client
Target
Client
Target
Client
Target
Client
Target
Object
IIOP
©
Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu
If you have any comments about this server, send e-mail to
webmaster@npac.syr.edu
.
Page produced by
wwwfoil
on Sat Mar 27 1999