![]() ![]() |
![]() |
File: [Pegasus] / pegasus / Schemas / CIM231 / DMTF / Policy / CIM_AcceptCredentialFrom.mof
(download)
Revision: 1.1, Tue Jan 24 13:50:28 2012 UTC (12 years, 5 months ago) by marek Branch: MAIN CVS Tags: preBug9676, postBug9676, TASK-TASK_PEP362_RestfulService_branch-root, TASK-TASK_PEP362_RestfulService_branch-merged_out_from_trunk, TASK-TASK_PEP362_RestfulService_branch-merged_in_to_trunk, TASK-TASK_PEP362_RestfulService_branch-merged_in_from_branch, TASK-TASK_PEP362_RestfulService_branch-branch, TASK-PEP362_RestfulService-root, TASK-PEP362_RestfulService-merged_out_to_branch, TASK-PEP362_RestfulService-merged_out_from_trunk, TASK-PEP362_RestfulService-merged_in_to_trunk, TASK-PEP362_RestfulService-merged_in_from_branch, TASK-PEP362_RestfulService-branch, TASK-PEP317_pullop-merged_out_from_trunk, TASK-PEP317_pullop-merged_in_to_trunk, RELEASE_2_14_1, RELEASE_2_14_0-RC2, RELEASE_2_14_0-RC1, RELEASE_2_14_0, RELEASE_2_14-root, RELEASE_2_14-branch, RELEASE_2_13_0-RC2, RELEASE_2_13_0-RC1, RELEASE_2_13_0-FC, RELEASE_2_13_0, RELEASE_2_13-root, RELEASE_2_13-branch, RELEASE_2_12_1-RC1, RELEASE_2_12_1, RELEASE_2_12_0-RC1, RELEASE_2_12_0-FC, RELEASE_2_12_0, RELEASE_2_12-root, RELEASE_2_12-branch, HEAD, CIMRS_WORK_20130824 Branch point for: TASK-PEP317_pullop-branch BUG#:9155 TITLE: Upgrade Pegasus to Include the CIM 2.31 Schema in CVS DESCRIPTION: |
// Copyright (c) 2005 DMTF. All rights reserved. [Association, Version ( "2.8.0" ), UMLPackagePath ( "CIM::Policy" ), Description ( "This association specifies that a credential management " "service (e.g., CertificateAuthority or Kerberos key " "distribution service) is to be trusted to certify credentials, " "presented at the packet level. The association defines an " "\'approved\' CredentialManagementService that is used for " "validation. \n" "\n" "The use of this class is best explained via an example: \n" "If a CertificateAuthority is specified using this association, " "and a corresponding X509CredentialFilterEntry is also " "associated with a PacketFilterCondition (via the relationship, " "FilterOfPacketCondition), then the credential MUST match the " "FilterEntry data AND be certified by that CA (or one of the " "CredentialManagementServices in its trust hierarchy). " "Otherwise, the X509CredentialFilterEntry is deemed not to " "match. If a credential is certified by a " "CredentialManagementService associated with the " "PacketFilterCondition through the AcceptCredentialFrom " "relationship, but there is no corresponding " "CredentialFilterEntry, then all credentials from the related " "service are considered to match." ), MappingStrings { "IPSP Policy Model.IETF|AcceptCredentialFrom" }] class CIM_AcceptCredentialFrom : CIM_Dependency { [Override ( "Antecedent" ), Description ( "The CredentialManagementService that is issuing the " "credential to be matched in the PacketFilterCondition." ), MappingStrings { "IPSP Policy Model.IETF|AcceptCredentialFrom.Antecedent" }] CIM_CredentialManagementService REF Antecedent; [Override ( "Dependent" ), Description ( "The PacketFilterCondition that associates the " "CredentialManagementService and any " "FilterLists/FilterEntries." ), MappingStrings { "IPSP Policy Model.IETF|AcceptCredentialFrom.Dependent" }] CIM_PacketFilterCondition REF Dependent; };
No CVS admin address has been configured |
Powered by ViewCVS 0.9.2 |