Hi All, I'm looking for more information on the Access Management Service and I can't seem to find where it might be documented.
Specifically, I'm looking at: How it is populated? How responses are encrypted/signed? Is there a hierarchical structure to them, i.e. if a resource is not found in one can a server request it from another? Is there a difference on how a server requests an ACL from a local AMS vs a remote/cloud based one? Thanks for any help you can provide. Kyle Kyle Haefner, M.S. Communication Systems Programmer Colorado State University Fort Collins, CO Phone: 970-491-1012 Email: kyle.haefner at colostate.edu SIP: kyle.haefner at colostate.edu
