OSF DCE Application Development Guide--Introduction and Style Guide

OSF DCE Application Development Guide—Introduction and Style Guide
1.6.2 Annotating the Binding Handle for Security ....... 1-27
1.6.3 Invoking Remote Procedure Calls .......... 1-29
1.7 The Server’s Manager of RPC Requests ........... 1-31
1.7.1 Getting the Client’s Credentials ........... 1-31
1.7.2 Getting the Object’s ACL ............. 1-32
1.7.3 Making the Authorization Decision .......... 1-32
1.7.4 Servicing the RPC Request ............ 1-33
1.7.5 Returning the Results and Resuming Listening ...... 1-33
1.8 About DCE Programming Style ............. 1-34
1.8.1 Mechanism, Policy, and Style ............ 1-35
1.8.2 Policy and Style Issues .............. 1-36
1.8.3 General Policies ................ 1-37
Chapter 2. Threads ...................... 2-1
2.1 Thread Use Policy ................. 2-2
2.1.1 Choosing to Thread ............... 2-2
2.1.2 Specifying the Number of Threads .......... 2-3
2.1.3 Scheduling Policies ............... 2-4
2.2 Thread Safety .................. 2-4
2.3 Threads Programming Topics .............. 2-7
2.3.1 Thread Handles ................ 2-7
2.3.2 Storage for Thread Specific Data ........... 2-8
2.3.3 Canceling Threads ............... 2-9
2.3.4 Signals .................. 2-14
2.3.5 Forking in a Threaded Application .......... 2-18
2.4 RPC Threads and RPC Cancel Semantics .......... 2-19
Chapter 3. Security ...................... 3-1
3.1 The Basic Security Model ............... 3-2
3.2 Application Roles ................. 3-3
3.3 Authentication Model ................ 3-4
3.3.1 The DCE Authentication Model ........... 3-4
3.3.2 Application-Level Authentication .......... 3-5
3.3.3 Obtaining an Authentication Identity ......... 3-7
3.3.4 The Authenticated RPC Call ............ 3-8
3.3.5 Managing Keys ................ 3-9
3.3.6 Default Server Authentication Steps .......... 3-10
3.3.7 Default Client Authentication Steps .......... 3-14
3.4 Authorization .................. 3-17
3.4.1 Client Credentials ............... 3-19
3.4.2 Access Control Lists .............. 3-20
3.4.3 ACL Managers ................ 3-22
Chapter 4. Binding ...................... 4-1
4.1 The Binding Model ................. 4-1
4.1.1 Server Binding Model .............. 4-3
4.1.2 Client Binding Model .............. 4-6
4.1.3 Call Routing ................. 4-7
4.1.4 Routing Policy ................ 4-7
4.2 Binding Handles .................. 4-9
iv Tandem Computers Incorporated 124246