Oracle Secure Enterprise Search Identity Plug-in |
||||
In this module, you learn about the Identity plug-in in detail. Though you study the Authorization plug-in in the next section, you will understand when to use the Identity plug-in and the Authorization plug-in in this module. Before building a custom Identity plug-in, you will list the design considerations. After familiarizing yourself with the requirements, you will build the custom plug-in and register it. Finally, you will activate the custom plug-in and use it for the secure search. You will watch Timothy put together the tasks listed above as we proceed through this module.
|