Privilege Delegation
No delegation
The intermediary uses its own credentials
Simple delegation
The intermediary impersonates the client
Composite delegation
The intermediary uses both
Client
Target
Client
Target
Client
Target
Client
Target
Object
IIOP
Previous slide
Next slide
Back to first slide
View graphic version