Managing Privileges, etc

Managing Privileges, etc

The management of privileges and their assignments to roles, persons, etc are the key to securing a veil-based application. It is therefore vital that privilege assignment is itself a privileged operation.

The veil demo does not provide an example of how to do this, and this section does little more than raise the issue.

IT IS VITAL THAT YOU CAREFULLY LIMIT HOW PRIVILEGES ARE MANIPULATED AND ASSIGNED!

Here are some possible rules of thumb that you may wish to apply:

Next: Exotic and Esoteric uses of Veil


Generated on Tue Mar 11 10:08:39 2008 for Veil by  doxygen 1.5.4