Posts tagged 'access'

adminstration

Access 5: Juggling Keys in the Rules DB

Access Control is powerful. System-central storage is a bit iffy. How do we stop people from abusive tapping?

>> Continue reading <<

adminstration

Access 4: ARPA2 Access Control for Mail

We just demonstrated how you can configure access control in a local database. The next step is to actually put it to use. Lets control our email!

>> Continue reading <<

adminstration

Access 3: ARPA2 Access Control and Groups for Admins

Let's say you own a domain name, and have software that uses ARPA2 Access Control. How, then, can you grant or revoke access?

>> Continue reading <<

architecture

Access 2: Shaped like a Matrix

There are two ways of looking at Access Control. One is easy, with a direct relation to the resources being managed. The other is advanced, but like putty in the hands of administrators; moreover, it is highly efficient. Efficiency matters; it allows us to enforce access control everywhere, with no experienced discomfort. We derive the efficient model from the one that is easy to use.

>> Continue reading <<

architecture

Access 1: Dialing into Access Control

Our work on Identity is ultimately for controlling access to online services. We now introduce our thoughts on Access Control. The whole story is complex, but an analogy to the phone system can help to explain it.

>> Continue reading <<