...
An IAclHolder
does exactly what its name implies--it holds or contains an access control list. An ACL is implemented in the platform using a java.util.List
. Inside this list are implementations of AclEntry
Acegi
Panel | ||||
---|---|---|---|---|
| ||||
Solution Repository Objects
...
One might ask: How many ways can a voter arrive at a decision? Assume that user sally
has the following granted authorities: ROLE_DEV
and ROLE_MGR
. Also assume that the ACL for a particular object contains the following entries: (sally
, read
), (ROLE_DEV
, readwrite
). Both ACL entries are applicable to sally
since the first specifies sally
(and she is sally
) and the second specifies ROLE_DEV
(and she has been granted the ROLE_DEV
authority). Should the voter grant or deny a request to write to the object associated with this ACL? This is where extensibility of the voting system comes in. The Pentaho BI Platform provides multiple implementations of IAclVoter
that each make different decisions in this situation! As the user of the platform, you decide how access decisions are made through your choice of IAclVoter
. For more information about IAclVoter
implementations, see 12. IAclVoter Node.
Panel | ||||
---|---|---|---|---|
| ||||
ACL Management
ACLs can be managed using a graphical interface that is accessed via the Admin menu. Once on the Admin menu, click Permissions to start the manager.
...