Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The authorization system works with any number of individually configured (Phase 1) attribute providers each of which can generate attributes.  Further, a single (Phase 2) authorization provider, also configured here, will determine, based on the provided collected attributes, whether the user is authorized or not.

...