[Next]
[Up]
[Previous]
[Contents]
Next:
5.2.2.1 [IMAGE ]What is
Up:
5.2 Particular Implementations
Previous:
5.2.1.12 Where can find
5
.
2
.
2
OrbixSecurity
5
.
2
.
2
.
1
[IMAGE ]What is the conformance level of OrbixSecurity?
5
.
2
.
2
.
2
[IMAGE ]Where do I start from in order to use OrbixSecurity?
5
.
2
.
2
.
3
What DCE components are required to use OrbixSecurity?
5
.
2
.
2
.
4
Can a user on a remote machine still run the server and call its methods if he or she changes their username on the remote machine deliberately to match the registered users list?
5
.
2
.
2
.
5
What authentication process is used in OrbixSecurity?
5
.
2
.
2
.
6
How does OrbixSecurity work and how and what component of DCE needs to be installed?
5
.
2
.
2
.
7
[IMAGE ]Can we use Orbix security to provide Access control at Object instance level?
5
.
2
.
2
.
8
Authentication Security Exception