Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This section provides a list of security measures that are offered to protect Jethro Instances. The security measures are divided into the following categories:

Authentication

The act of verifying the identity of a user.

Authorization

The function of specifying access rights to resources and operations.

Auditing

The ability to monitor selected user actions according to a defined security policy.

Terminology

USER - An individual, identified by an underlying authentication system. A User is defined and authenticated via an external LDAP service.

...

ROLE - A set of permissions. ROLE is identified by role name. ROLE can be applied to GROUP. The relations between ROLES and GROUP are defined within Jethro authorization model.

See Also

Setting up a Kerberos Instance