(file) Return to PegasusSecurityArchitecture.ppt CVS log (file) (dir) Up to [Pegasus] / pegasus / doc

  1 kumpf 1.1 ࡱ>		(@
  2           b/0DTimes New Romanl4t!0hz0DFutura LtRomanl4t!0hz0 "
  3           `.
  4           	@n?" dd@  @@``T
%
*
  5           &,
  6           c$@f3@{g46d6d!0ppp@<4!d!d0<X5<4BdBdo0<uʚ;2Nʚ;<4dddd0?
O=
  7           Pegasus Security Implementation+Author: Nag Boranna
Hewlett-Packard CompanySecurity Block Diagram Authentication Block Diagram 
Authorization Block Diagram Authentication Implementation  
  8           Authentication Components Authorization Implementation  	Authorization Components Security Configurations Enabling Authentication Enabling Authorization /T		` ` ̙33` 333MMM` ff3333f` f` f` 3>?" dd@,|?" dd@   " @ ` n?" dd@  @@``PR		 	@	`	`p>>^(	
  9           
 10           
 11           6i	P
T Click to edit Master title style!
 12           !
 13           
 14           0ll	
RClick to edit Master text styles
Second level
Third level
Fourth level
Fifth level!


 15           S
 16           
 17           0p	``
72/26/02
 18           
 19           0t	`	
?
Pegasus CIMOM
 20           
 21           0x	` 
@*H
 22 kumpf 1.1 0޽h	? ̙33 Default Design0P8(	m
 23           
 24           
 25           Nآkk	z%
 26           
v*K%%KKpp
 27           
 28           N0kk		@%
x*K%%KKppd
 29           
 30           c$	?XK
 31           4
 32           
 33           Nkk	
 34           M)
RClick to edit Master text styles
Second level
Third level
Fourth level
Fifth level!


 35           S
 36           
 37           Tkk	z	
v*K%%KKpp
 38           
 39           Tʻkk		@
x*K%%KKppH
 40           0.k	? ̙33P$(	
 41           Pr
 42           P S|p
r
 43 kumpf 1.1 P Sԡ
 44           ` 
H
 45           P0޽h	? ̙33E$
##0+ (	
 46           r
 47            S`P


 48           g
 49           #l?0-<PCG8
;Monitor
 50           h
 51           #l`?0-<Pp
K
HTTP
Acceptor"	
 52           i
 53           #lD?0-<Pi
AHTTP
Connection
 54           j
 55           #lx?0-<P
AHTTP
Connectiondb
 56           k<G0*HI"8^b
 57           l6G)HWJII8
 58           m
 59           #l?0-<P:
MHTTP
Connection"B
 60           n
 61           bE`FNQ&UVW}))?XX6381-D81^DS	&{'LO^D+ YL^0L8]T+ YL7Gn2H+IJ7GI:9]T:I:Q= 
 62           qR&QJ
 63           7JJ
 64 kumpf 1.1 >:*;9>:+$.+]
 65           x!+]
 66           6381$	3-D^D
%D^0L8]TH+ YL^0L8]T7G@8Cn2H+IJI:B,= 
 67           qR&N7#Q7JK
J
 68           7J>:8*;9+ +$	x!+]
 69           x!+$(,`C0*0*ITNT0*0*BCCloud

<
Network		db
 70           o@<GHObIh*Gjb
 71           p@BZG *H$.I3@Gi
 72           q
 73           6Z=g
9creates
 74           r
 75           #l$?0-<Pp
ZHTTP
Authenticator
Delegator"
 76           s
 77           #l8?0-<PP
 78           
@
[CIM Operation
Request
Decoder"
 79           t
 80           #l	?0-<P`
@
XCIM Export
Request
Decoder"
 81           u
 82           #l?0-<P
\CIM Operation
Response
Encoder"dR
 83           v@<ZGuHb4Iu"^b
 84           w6G0*HhIC*
"^b
 85 kumpf 1.1 x6G0*HIC"
:

 86           y
 87           #l?0-<P
^ CIM Operation
Request
Dispatcher"!db
 88           z<G0*H3I^yP
 89           dR
 90           {@<GYHOIYdb
 91           |<G&*H6Ijdb
 92           }<ZG(HIuc6
 93           
 94           ~
 95           <Gq[H~
D#2. Socket
Message
 96           
 97           <G7H"
i7#3. HTTP Request
Message
#5.HTTP Challenge Response Msg88
 98           
 99           <G`H
 
100           :k
K#6. HTTP
Request
Messages
101           
102           <!GdH`0J|
J#8. CIM
Request
Messages
103           
104           <"GH0J{
K#9. CIM
Response
Messages
105           
106 kumpf 1.1 <)GTHaP
107           
K#10.HTTP
Response
MessageB
108           
109           b(E`FNQ&UVW}))?XX6381-D81^DS	&{'LO^D+ YL^0L8]T+ YL7Gn2H+IJ7GI:9]T:I:Q= 
110           qR&QJ
111           7JJ
112           >:*;9>:+$.+]
113           x!+]
114           6381$	3-D^D
%D^0L8]TH+ YL^0L8]T7G@8Cn2H+IJI:B,= 
115           qR&N7#Q7JK
J
116           7J>:8*;9+ +$	x!+]
117           x!+$(,`C0*0*ITNT0*0*BCCloud
118           0;
LRepository and
ProvidersdR
119           <ZGHI
120           
121           <0GHF[
K#1. Socket
Ready for read
122           
123           <4GH+	|@
C#11. Socket
Write
124           
125           #lX8?0-<Pp
126           

`Authentication
Manager.jb
127 kumpf 1.1 BG0*HBI@2
128           pdb
129           <G)H'I	j"
130           
131           <>GHk p	
L#4. HTTP
Challenge
Message
132           
133           #l@?0-<P 00
`"CIM Operation 
Request 
Authorizer"#dR
134           <GHGIp 
135           
136           <EGdH`
137           	
J#7. CIM
Request
Messages^r
138           6GH<I
139           @:
H
140           0޽h	?6ghk7gil8ngo9hip:mrv;rsw<rtx=sz>yu{?um|@y}A~BCDEFGmnHIKrTrmUVWXt ̙33u
%`$$(	
141           x
142            c$0


143           
144           #lP?0-<PP	
WAuthenticator
(Interface)"
145           
146           #l$?0-<P _
UAuthentication 
Manager"
147           
148 kumpf 1.1 #l8?0-<P p
ZLocal
Authentication
Handler"^B
149           
150           6DfP
151           P
152           n
153           
154           #l	?0-<P ``p
ZBasic
Authentication
Handler"
155           
156           #l?0-<P 	p
ODigest
Authentication
HandlerXB
157           	
158           0Dfu   XB
159           
160           
161           0Dfu

 XB
162           
163           0DfuP
164           P
165            XB
166           
167           0Dfn 
n^B
168           
@
169 kumpf 1.1 6Dfn0 n
170           
171           #l?0-<P	T
]Basic
Authenticator
(Interface)" ^B
172           
173           6DfN``
174           
175           #ld?0-<Ppp
APAM"
176           
177           #l8?0-<P
XSecure
Basic
Authenticator"XB
178           
179           0Df00XB
180           
181           0DfXB
182           
183           0Df``XB
184           
185           0Df0
186           
187           #l?0-<P
188           

XSimple
Basic
Authenticator"^B
189           @
190 kumpf 1.1 6Df^r
191           6GH؛IuP_`
192           dr
193           @<ZGHduIA2`
194           
195           
196           #l"?0-<P	0T
]Local
Authenticator
(Interface)" ^B
197           
198           6DfN
199           
200           #l'?0-<P00
^ File System
Based
Authentication"! XB
201           
202           0Dfdb
203           <GgHOI60
204           
205           
206           #l,?0-<P	` 
207           T
^ Digest
Authenticator
(Interface)"! db
208            <ZG0*H`8IpP
209           	
210           !
211 kumpf 1.1 T1?GYHl?P}
212           P
PPlug-in Authentication Modules
213           "
214           T5?GYHl? M
OPlug-in Authentication Module
215           #
216           T8?G3H?@k
@HTTP Specific 
217           $
218           < <GYH7sP
0k
xFHandles HTTP Specific Information, but does not deal with the protocolGGH
219           0޽h	? !"#$ ̙33s	
#		)0K(	
220           0x
221           0 c$8


222           0
223           #lTz?0-<PP
224           p

@User Manager


225           0
226           #lH~?0-<P _
V"CIM Operation 
Request 
Authorizer##^b
227           06G&*HHIv_
228           
229           0
230           #l,?0-<PP
JAuthorization 
Handler^
231           06G,HI,p
b
232 kumpf 1.1 %0
233           B?}))?	
HInstance 
Repositorydb
234           &0@<ZG0*H=
235           I;@o
236           '0
237           `̙jJ?Z
YLoad Authorizations*(2
238           
239           (0
240           `t̙jJ?_

ZVerify Authorization*(2
241           
242           )0
243           `x̙jJ?`
244           
ZVerify Authorization*(2
245           H
246           00޽h	??`0000000%0&0 ̙33z
*"(	@
247           l
248            Cl@P


249           
250           0Խ`

Z
Startup:
- CIMSever creates the HTTPAuthenticatorDelegator queue.- HTTPAuthenticatorDelegator creates AuthenticationManager- AuthenticationManager loads the AuthenticationHandlers (Currently it is creating instances of Authentication Handlers, but it should be changed to dynamically load those handlers)On Client Request:
- HTTPConnection queue gets created when there is connection request from a client  - HTTPConnection creates AuthenticationInfo object to keep track of the authentication information for this connection. HTTPConnection and AuthenticationInfo object gets created for each new connection.- HTTPConnection gets CIM requests, adds AuthenticationInfo object reference & passes to Delegator   - Delegator parse the request and looks for  Authorization  or  PegasusAuthorization  header tags- If the  Authorization  and  PegasusAuthorization  tags are not found: 	* Calls getAuthResponseHeader() of the AuthenticationManger 	* Sends challenge to the HTTPConnection queue, and eventually to the client- If the  Authorization  tag is found:	* Calls performHttpAuthentication() method of AuthenticationManager	* If authentication is successful, then it passes the request to Decoders. Else calls 		getAuthResponseHeader() of the AuthenticationManger and sends challenge back. - If the  PegasusAuthorization  tag is found:	* Calls performPegasusAuthentication() method of AuthenticationManager	* If authentication is successful, then it passes the request to Decoders. Else calls 		getAuthResponseHeader() of the AuthenticationManger and sends challenge back. 
- In all these cases the AuthenticationInfo object is updated with the authentication status for that connection session.8 2+iH
251           0޽h	? ̙33F
$(	`
252           $r
253 kumpf 1.1 $ S @


254           $
255           0 
tAuthentication Manager- AuthenticationManager loads the Authentication Handlers - When perforHttpAuthentication() or performPegasusAuthentication() methods are called 
	* it parses the HTTP headers to get the auth type, user name & password information
	* calls authenticate() method of the Authentication Handler module
	* On successful authentication, updates AuthenticationInfo object and returns true else false
- When getAuthResoponseHeader() method is called, it gets the header from Authentication Handlers
Authentication Handlers (LocalAuthenticationHandler)- Implements the Authenticator interface- Creates response header when getAuthResoponseHeader() method is called (may get the header information from the authenticator module).- Extracts user name and password (or digest string) from the header info passed with the authenticate() and calls the authenticate() method of the loaded authenticator module.
Authenticators (SecureLocalAuthenticator)- Implements specific authenticator interface (e.g, BasicAuthenticator)- The getAuthResponseHeader() method will return the authentication challenge header info.- The authenticate() method will verify the user name and password or the digest string and   return true on successful authentication, false otherwise.V 2d=H
256           $0޽h	? ̙33
8=(	
257           8r
258           8 S


259           8
260           0{M`@
+Startup:
- CIMSever creates the CIMOperationRequestAuthorizer queue if requireAuthorization config property is set to true.- CIMOperationRequestAuthorizer gets an instance of UserManager
- UserManager creates AuthirizationHandler- AuthenticationHandler loads authorizations from the Repository. 
On Client Request:
- CIMOperationRequestAuthorizer queue receives a request message from Decoder 
- CIMOperationRequestAuthorizer calls verifyAuthorization( ) method of UserManager. 
- UserManager calls verifyAuthorization( ) method of AuthorizationHandler.
- AuthorizationHandler verifies the authorizations and return true if authorization were found else false8 2"Z: 	+/SH
261           80޽h	? ̙33
rj<(	
262           <r
263           < SD@

P
264           <
265           0 b	
0CIMOperationRequestAuthorizer- Gets the user name, namespace, authentication type and CIM method names from the CIM request
- Calls UserManager s verifyAuthorization( ) method
 User Manager- Creates AuthirizationHandler and calls its verifyAuthorization( ) method
Authorization Handler
- Loads authorizations from the repository - Verifies user authorizations when verifyAuthorization( ) method is calledB 2LxZh!$
qH
266           <0޽h	? ̙333
s(	@c@@N@
267           r
268            S(@@


269           
270           03v
aConfiguration Properties required for Authentication Module
	requireAuthentication = true | false
	httpAuthType = Basic | Digest
	passwordFilePath = cimserver.passwd (use the file in PEGASUS_HOME directory)

Configuration Properties required for Authorization Module
	requireAuthorization = true | false
    	enableRemotePrivilegedUserAccess = true | false (enable or disable remote root access to the cimom)
0 2<;t
271           g <H
272           0޽h	? ̙33$	
 (d(	
273           (r
274 kumpf 1.1 ( S< 


275           (
276           0@p` 
R1. Set the following configuration properties in the cimserver_planned.conf file
    requireAuthentication = true 
    httpAuthType = Basic  (to enable HTTP Basic Authentication)
    passwordFilePath = cimserver.passwd (to create/use the password file in PEGASUS_HOME directory)
3. Start cimserver
4. Add new users to cimom (Refer to pegasus/src/Clients/cimuser/doc/cimuser.htm)
    To add user  nag  with password  nag  (user  nag  must be valid system user on that system)
    cimuser -a -u nag -w nag
5. Run any CIM clients to do CIM operations with the cimom. 

Note: 
(1) On Unix systems, the cimuser CLI can only be run locally as  root .
(2) Basic/Digest authentication are not fully implemented on the CIMServer and the CIMClient API. 2L4
277           0	D
278           
279           	fF#	h			H
280           (0޽h	? ̙33
 ,&(	
281           ,r
282           , S`

t
283           ,
284           0`n

1. Set the following configuration properties in the cimserver_planned.conf file
    requireAuthorization = true 
    enableRemotePrivilegedUserAccess = false (to disable remote root user access to the cimom)
2. Start cimserver
3. Add authorizations to the CIM users (Refer to pegasus/src/Clients/cimuser/doc/cimauth.html)
    To add both read and right authorizations to user  nag  on namespace  root/cimv2 
    cimauth -a -u nag -n root/cimv2 -R -W
4. Run any CIM clients to do CIM operations with the cimom. 

Note:
    (1) On Unix systems, user  root  by default will have all the authorizations for local clients (the clients that use ConnectLocal() of CIMClient API.
    (2) The cimauth CLI can only be run locally as  root  on Unix systems. 24
285           
286           "3
287           
288           1	\S
289           7H
290           ,0޽h	? ̙330zr@
291           (	
292           X
293            CXK
294           r
295 kumpf 1.1  SԻ
296           M)
H
297           0.k	? ̙330~p (	|
298            ^
299             SXK
300           x
301             c$XD
302           M)
H
303            0.k	? ̙330~4(	I;
304           4^
305           4 SXK
306           x
307           4 c$t
308           M)
H
309           40.k	? ̙33rL	Ya8Ma?p3_Wݝ)x.~(
310           	(@
311           /0DTimes New Romanl4t!0hz0 DFutura LtRomanl4t!0hz0 " DComic Sans MSnl4t!0hz0 B
312           `.
313           	@n?" dd@  @@``On-screen ShowHewlett Packard42	Times New Roman
314           Futura LtComic Sans MSDefault DesignPegasus Security ArchitectureSecurity ArchitectureAuthenticationAuthorizationAuthentication Implementation Authentication ComponentsAuthorization Implementation Authorization ComponentsSecurity ConfigurationsEnabling AuthenticationEnabling AuthorizationFonts UsedDesign Template
Slide Titles
Slide Title_AITAIT_-AITAIT--&G&
315           JwSwgw
316 kumpf 1.1 
317           -	@Times New RomanSwgw
318           
319           -	  @@``T
%
*
320           &,
321           c$@f3@{g4NdNd!0ppp@<4!d!d0<X5<4BdBdo0<uʚ;2Nʚ;<4dddd0?
O=
322           Pegasus Security Implementation+Author: Nag Boranna
Hewlett-Packard Company,,Security Architecture Authentication 

Authorization
 Authentication Implementation  
323           Authentication Components Authorization Implementation  	Authorization Components Security Configurations Enabling Authentication Enabling Authorization /T	E$
##0+ (	
324           r
325            S`P


326           g
327           #l?0-<PCG8
;Monitor
328           h
329           #l`?0-<Pp
K
HTTP
Acceptor"	
330           i
331           #lD?0-<Pi
AHTTP
Connection
332           j
333           #lx?0-<P
AHTTP
Connectiondb
334           k<G0*HI"8^b
335           l6G)HWJII8
336           m
337 kumpf 1.1 #l?0-<P:
MHTTP
Connection"B
338           n
339           bE`FNQ&UVW}))?XX6381-D81^DS	&{'LO^D+ YL^0L8]T+ YL7Gn2H+IJ7GI:9]T:I:Q= 
340           qR&QJ
341           7JJ
342           >:*;9>:+$.+]
343           x!+]
344           6381$	3-D^D
%D^0L8]TH+ YL^0L8]T7G@8Cn2H+IJI:B,= 
345           qR&N7#Q7JK
J
346           7J>:8*;9+ +$	x!+]
347           x!+$(,`C0*0*ITNT0*0*BCCloud

<
Network		db
348           o@<GHObIh*Gjb
349           p@BZG *H$.I3@Gi
350           q
351           6Z=g
9creates
352           r
353           #l$?0-<Pp
ZHTTP
Authenticator
Delegator"
354           s
355           #l8?0-<PP
356           
@
[CIM Operation
Request
Decoder"
357           t
358 kumpf 1.1 #l	?0-<P`
@
XCIM Export
Request
Decoder"
359           u
360           #l?0-<P
\CIM Operation
Response
Encoder"dR
361           v@<ZGuHb4Iu"^b
362           w6G0*HhIC*
"^b
363           x6G0*HIC"
:

364           y
365           #l?0-<P
^ CIM Operation
Request
Dispatcher"!db
366           z<G0*H3I^yP
367           dR
368           {@<GYHOIYdb
369           |<G&*H6Ijdb
370           }<ZG(HIuc6
371           
372           ~
373           <Gq[H~
D#2. Socket
Message
374           
375           <G7H"
i7#3. HTTP Request
Message
#5.HTTP Challenge Response Msg88
376           
377           <G`H
 
378           :k
K#6. HTTP
Request
Messages
379 kumpf 1.1 
380           <!GdH`0J|
J#8. CIM
Request
Messages
381           
382           <"GH0J{
K#9. CIM
Response
Messages
383           
384           <)GTHaP
385           
K#10.HTTP
Response
MessageB
386           
387           b(E`FNQ&UVW}))?XX6381-D81^DS	&{'LO^D+ YL^0L8]T+ YL7Gn2H+IJ7GI:9]T:I:Q= 
388           qR&QJ
389           7JJ
390           >:*;9>:+$.+]
391           x!+]
392           6381$	3-D^D
%D^0L8]TH+ YL^0L8]T7G@8Cn2H+IJI:B,= 
393           qR&N7#Q7JK
J
394           7J>:8*;9+ +$	x!+]
395           x!+$(,`C0*0*ITNT0*0*BCCloud
396           0;
LRepository and
ProvidersdR
397           <ZGHI
398           
399           <0GHF[
K#1. Socket
Ready for read
400 kumpf 1.1 
401           <4GH+	|@
C#11. Socket
Write
402           
403           #lX8?0-<Pp
404           

`Authentication
Manager.jb
405           BG0*HBI@2
406           pdb
407           <G)H'I	j"
408           
409           <>GHk p	
L#4. HTTP
Challenge
Message
410           
411           #l@?0-<P 00
`"CIM Operation 
Request 
Authorizer"#dR
412           <GHGIp 
413           
414           <EGdH`
415           	
J#7. CIM
Request
Messages^r
416           6GH<I
417           @:
H
418           0޽h	?6ghk7gil8ngo9hip:mrv;rsw<rtx=sz>yu{?um|@y}A~BCDEFGmnHIKrTrm	
419           
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPlRTUVWXYZ[\]^_`abcdefghxkmnopqStuvwQz{|}~Root EntrydO)P=cs
Current User2)SummaryInformation(H	PowerPoint Document(4DocumentSummaryInformation8%,T
%
*
420           &,
421 kumpf 1.1 c$@f3@{g4NdNd!0ppp@<4!d!d0<X5<4BdBdo0<uʚ;2Nʚ;<4dddd0?
O=
422           Pegasus Security Implementation+Author: Nag Boranna
Hewlett-Packard Company,,Security Block Diagram Authentication Block Diagram 
Authorization Block Diagram Authentication Implementation  
423           Authentication Components Authorization Implementation  	Authorization Components Security Configurations Enabling Authentication Enabling Authorization /T	P$(	
424           Pr
425           P S|`
r
426           P Sԡ0	`
H
427           P0޽h	? ̙33r#)
428           	(@
429           /0DTimes New Romanl4t!0hz0 DFutura LtRomanl4t!0hz0 " DComic Sans MSnl4t!0hz0 B
430           `.
431           	@n?" dd@	
432           
 !"#$3&'()*+,-./01Oh+'0	
px	 
433           @LX
dpxPegasus SecurityeNag BorannaXGives an overview of Pegasus Authentication and Authorization Implementation and usage.AIT228Microsoft PowerPointPeg@0q@ G_06L@p*()@UGg	3&	&&#TNPP2OMit
434           &
435           TNPP	&&TNPP
---	!---&G&
436           MJwSwgw
437           M
438           -	@Times New RomanSwgw
439           3
440           -	.2
441           R2/26/02					.&y&		.	2
442 kumpf 1.1 f1	.--q@--	@Times New RomanSwgw
443           S
444           -	.32
445           wPegasus Security Architecture!!*.--!--	@BComic Sans MSwSwgw
446           6
447           -	.$2
448           4Author: Nag Boranna
449           
450           
451           .@BComic Sans MSwSwgw
452           W
453           -	.2
454           .Hewlett
.	.	2
455           -.	.2
456           Packard Company


.--"Systemwf
457           
458           -&TNPP	&՜.+,0	
459           
UVWXt ̙33u
%`$$(	
460           x
461            c$0


462           
463 kumpf 1.1 #lP?0-<PP	
WAuthenticator
(Interface)"
464           
465           #l$?0-<P _
UAuthentication 
Manager"
466           
467           #l8?0-<P p
ZLocal
Authentication
Handler"^B
468           
469           6DfP
470           P
471           n
472           
473           #l	?0-<P ``p
ZBasic
Authentication
Handler"
474           
475           #l?0-<P 	p
ODigest
Authentication
HandlerXB
476           	
477           0Dfu   XB
478           
479           
480           0Dfu

 XB
481           
482           0DfuP
483           P
484 kumpf 1.1  XB
485           
486           0Dfn 
n^B
487           
@
488           6Dfn0 n
489           
490           #l?0-<P	T
]Basic
Authenticator
(Interface)" ^B
491           
492           6DfN``
493           
494           #ld?0-<Ppp
APAM"
495           
496           #l8?0-<P
XSecure
Basic
Authenticator"XB
497           
498           0Df00XB
499           
500           0DfXB
501           
502           0Df``XB
503           
504           0Df0
505 kumpf 1.1 
506           #l?0-<P
507           

XSimple
Basic
Authenticator"^B
508           @
509           6Df^r
510           6GH؛IuP_`
511           dr
512           @<ZGHduIA2`
513           
514           
515           #l"?0-<P	0T
]Local
Authenticator
(Interface)" ^B
516           
517           6DfN
518           
519           #l'?0-<P00
^ File System
Based
Authentication"! XB
520           
521           0Dfdb
522           <GgHOI60
523           
524           
525           #l,?0-<P	` 
526 kumpf 1.1 T
^ Digest
Authenticator
(Interface)"! db
527            <ZG0*H`8IpP
528           	
529           !
530           T1?GYHl?P}
531           P
PPlug-in Authentication Modules
532           "
533           T5?GYHl? M
OPlug-in Authentication Module
534           #
535           T8?G3H?@k
@HTTP Specific 
536           $
537           < <GYH7sP
0k
xFHandles HTTP Specific Information, but does not deal with the protocolGGH
538           0޽h	? !"#$ ̙33s	
#		)0K(	
539           0x
540           0 c$8


541           0
542           #lTz?0-<PP
543           p

@User Manager


544           0
545           #lH~?0-<P _
V"CIM Operation 
Request 
Authorizer##^b
546           06G&*HHIv_
547 kumpf 1.1 
548           0
549           #l,?0-<PP
JAuthorization 
Handler^
550           06G,HI,p
b
551           %0
552           B?}))?	
HInstance 
Repositorydb
553           &0@<ZG0*H=
554           I;@o
555           '0
556           `̙jJ?Z
YLoad Authorizations*(2
557           
558           (0
559           `t̙jJ?_

ZVerify Authorization*(2
560           
561           )0
562           `x̙jJ?`
563           
ZVerify Authorization*(2
564           H
565           00޽h	??`0000000%0&0 ̙33r Q:

566           -	(@
567           /0DTimes New RomanT5t!0hz0 DFutura LtRomanT5t!0hz0 " DComic Sans MSnT5t!0hz0 B
568 kumpf 1.1 `.
569           	@n?" dd@  @@``T%	
*
570           
571           &,c$@f3@{g4NdNd!0ppp@<4!d!d0<@6<4BdBdo0<uʚ;2Nʚ;<4dddd0?
O=
572           Pegasus Security Architecture+Author: Nag Boranna
Hewlett-Packard Company",Security Architecture Authentication 

Authorization
 Authentication Implementation  
573           Authentication Components Authorization Implementation  	Authorization Components Security Configurations Enabling Authentication Enabling Authorization /T	 P$(	
574           Pr
575           P S`
r
576           P Sx0	`
H
577           P0޽h	? ̙33r
578           	(@
579           /0DTimes New RomanT5t\!0thz0 DFutura LtRomanT5t\!0thz0 " DComic Sans MSnT5t\!0thz0 B
580           `.
581           	@n?" dd@  @@``T%	
*
582           
583           &,c$@f3@{g4NdNd!0hppp@<4!d!d0$@6<4BdBdo0$uʚ;2Nʚ;<4dddd0?
O=
584           Pegasus Security Architecture+Author: Nag Boranna
Hewlett-Packard Company",Security Architecture Authentication 

Authorization
 Authentication Implementation  
585           Authentication Components Authorization Implementation  	Authorization Components Security Configurations Enabling Authentication Enabling Authorization /T	r
586           	(@
587           /0DTimes New RomanT5t!0hz0 DFutura LtRomanT5t!0hz0 " DComic Sans MSnT5t!0hz0 B
588           `.
589 kumpf 1.1 	@n?" dd@  @@``T%	
*
590           
591           &,c$@f3@{g4NdNd!0ppp@<4!d!d0<@6<4BdBdo0<uʚ;2Nʚ;<4dddd0?
O=
592           Pegasus Security Architecture+Author: Nag Boranna
Hewlett-Packard Company",Security Architecture Authentication 

Authorization
 Authentication Implementation  
593           Authentication Components Authorization Implementation  	Authorization Components Security Configurations Enabling Authentication Enabling Authorization /T	r

594           Root EntrydO)`@s
Current User2*SummaryInformation(H	PowerPoint Document(4k	
595           
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPlTUVWXYZ[\]^_`abcdefghxmnopqStuvwQz{|}~	
596           
 !"#$3&'()*+,-./01horizationFonts UsedDesign Template
Slide Titles
Slide Title"_
597           Bapu Patil_-AITAIT--&G&
598           JwSwgw
599           
600           -	@Times New RomanSwgw
601           
602           -	

No CVS admin address has been configured
Powered by
ViewCVS 0.9.2