Page History
...
The authorization provider, for example, HmsAuthorizer, makes use of the attributes generated by the attribute providers. Per the requirements for HMS, it checks a 'Profiles' endpoint, as well as white-and-black lists.
Code Block | ||||
---|---|---|---|---|
| ||||
// You are authorizied if and only if: // You are not black-listed // --and-- you are either white-listed or your faculty type is from 0 to 4 inclusive authorizer : { name : net.shrine.authz.providerService.authorize.HmsAuthorizer } |
...
Code Block | ||||
---|---|---|---|---|
| ||||
// You Given the below regexTerms, you are authorizied if and only if: // You are not black-listed // --and-- you are either white-listed or your faculty type is from 0 to 4 inclusive // --and-- the string 'fp77' does not appear anywhere in your attributes authorizer : { name : net.shrine.authz.providerService.examples.RegexAuthorizer regexTerms : [ "wb-list.isBlack.false" "(wb-list.isWhite.true)|(faculty_type_and_id.faculty_type.[0-4])" "!(fp77)" ] } |
...
Overview
Content Tools