OSF DCE Application Development Guide--Introduction and Style Guide
Index
_____________________________
A
accept(),2-11
access algorithm
as implemented in DCE ACL
library, 3-21
standard DCE, 1-33
access control (authorization),
definition of, 3-1
access control list (ACL), 1-19
defined, 3-20
retrieving an object’s, 1-32
use of in authorization, 3-20
access criteria, tests of, 3-17
ACL, 1-8
binding routine, 3-23
database, 3-24
design guidelines, 1-33
entry types, 3-22
handles, 1-32
manager, 1-19, 3-22
and DCE ACL
library, 3-22
and DCE backing
store library,
3-23, 3-24,
3-26, 3-28,
3-29, 3-30
and remote ACL
(rdacl)
interface,
3-22
defined, 3-22, 3-27
extraction and
evaluation of
ACLs, 3-28
implementation
requirements,
3-24
need for multiple,
3-27
object name
resolution (to
ACL UUID)
in, 3-26
operations
responsible
for, 3-24
operations implemented by
library, 3-23
standard DCE entry types,
1-33
types, 1-33
UUID, 3-24
ACL-based authorization, 3-3
acl_edit, 1-32, 3-28
allocating
new memory, 6-10
parameter memory, 6-4
anonymous user UUID, 3-19
any_other ACL entry type, 3-22
arrays, 6-18
asynchronous, cancelability of
threads, 2-10, 2-14
at-least-once semantics, 6-1
atfork( ), 2-7, 2-18
attribute configuration file, 1-4, 1-7,
1-9, 1-11
attribute configuration language, 1-5
authenticated RPC, 1-18
authentication
and authorization, 1-29, 3-2
available services, 3-17
client’s decision to use or
not, 1-29
default model for server
authentication, 3-10
definition of, 3-1
definition of identity, 3-7
determining client’s
information, 1-31
124246 Tandem Computers Incorporated Index−1