|
To sum-up what you have learned in this module:
Authorization plug-ins permit customers to define their own security
model for each source, thus replacing the GUID-based ACL stamping. It
includes two components, which are Query Filter plug-in, and the Result
Filter plug-in. It can contain either or both the components.
As a developer:
 |
Analyze the authentication and authorization modules
|
 |
Study the flexible, extensible framework for the authorization plug-in
|
 |
List the steps for building a Query Time Authorization Plug-in
|
 |
Determine the class structure before actually implementing the
plug-in
|
 |
Build the custom Authorization plug-in by designing the necessary
Java classes
|
 |
Configure QTA to a source by setting Authorization parameter values,
thus ensuring secure search
|
|