Hi All, 

I'm looking for more information on the Access Management Service and I can't 
seem to find where it might be documented.  

Specifically,  I'm looking at:

How it is populated?
How responses are encrypted/signed?
Is there a hierarchical structure to them, i.e. if a resource is not found in 
one can a server request it from another?
Is there a difference on how a server requests an ACL from a local AMS vs a 
remote/cloud based one?


Thanks for any help you can provide.

Kyle


Kyle Haefner, M.S.
Communication Systems Programmer
Colorado State University
Fort Collins, CO
Phone: 970-491-1012
Email:  kyle.haefner at colostate.edu
SIP: kyle.haefner at colostate.edu
  • [dev] AMS Haefner,Kyle

Reply via email to