Alright.
So, do we store user permissions on the file system and in a way that
someone external can manipulate them?
Also, is it per user stuff that we store or per role stuff?
And, what if 10 ppl search at the same time?
Thanks,
Senaka
On Tuesday, 26 January 2016, Danesh Kuruppu wrote:
> Hi
Hi all,
I have planned to Implement X509 certificate as IS authenticator. the flow
of authentication will be like described in below image[1].
Flow of X509 certificate authentication [2]
1. The client opens a connection to the server and asks the server to
authenticate itself.
2. The se
Hi All,
We quickly went through code and checked how we can accommodate this change
with minimum changes to current implementation.
I can see 2 places where we can plug this as extension (and let users to
implement as per requirements).
API publisher is the only component that need direct API gatew
Hi Inosh,
My concerns for the above proposed method as follows.
AFAIU, in here what we are trying to do is to minimize the user interaction
with the device as much as possible for the auto enrolment scenario.
However according to above method, user should have to connect the device
to a machine a
Hi,
I did a performance test to check the impact of running analytics i.e. a
load test of instance execution and at the same time checked for the
analytics, the UI remains responsive as before.
Average time taken to load the details of a process instance is
approximately 2 seconds.
When filterin
Hi all,
We have already developed Google Drive connector.
The following resources are not implemented in the existing google drive
connector.
*Parents*
- delete - Removes a parent from a file.
- get - Gets a specific parent reference.
- insert - Adds a parent folder for a file.
-
Hi All,
As per the discussion happened at [1], Developer Studio has introduced a
Test Automation Framework and please find below details on the architecture
of the Test Automation Framework.
Test Automation framework consists of the following modules:
- Automation Framework Engine
-
Hi Susinda,
We are indexing all permission changes done for the resource.(add new
permissions, edit permissions, remove permissions etc). Any changes done
for user level will be track when searching the resource. we are getting
the user roles of the logged in user when searching the resource.
Tha
On Tue, Jan 26, 2016 at 4:13 AM, Vanjikumaran Sivajothy
wrote:
>
>
> On Mon, Jan 25, 2016 at 1:35 AM, Isuruwan Herath
> wrote:
>
>> Hi Lahiru,
>>
>> On Mon, Jan 25, 2016 at 9:12 AM, Lahiru J Ekanayake
>> wrote:
>>
>>> Adding isabelle
>>>
>>> On Mon, Jan 25, 2016 at 8:21 AM, Lahiru J Ekanayake
On Tue, Jan 26, 2016 at 8:32 AM, Chandana Napagoda
wrote:
> Hi Senaka,
>
> Here we are providing resource authorization information into Solr . So
> when the user is performing search operation, we are adding user roles as
> Solr query parameter. Then Solr search result contains the resource path
Hi Senaka,
Here we are providing resource authorization information into Solr . So
when the user is performing search operation, we are adding user roles as
Solr query parameter. Then Solr search result contains the resource paths
which are visible to the user who is performing search operation. H
Hi Danesh,
Hang-on. So, you check authorizations once and forall? and then cache it?
If so, is it @ a user-level or a role-level?
Thanks,
Senaka.
On Mon, Jan 25, 2016 at 1:30 PM, Danesh Kuruppu wrote:
> Hi all,
>
> [+] Senaka.
>
> We tested the above fix with 3000 assets (wsdl - 32, wadl - 08,
On Mon, Jan 25, 2016 at 1:35 AM, Isuruwan Herath wrote:
> Hi Lahiru,
>
> On Mon, Jan 25, 2016 at 9:12 AM, Lahiru J Ekanayake
> wrote:
>
>> Adding isabelle
>>
>> On Mon, Jan 25, 2016 at 8:21 AM, Lahiru J Ekanayake
>> wrote:
>>
>>> G-Reg/ES Taxonomy Feature
>>>
>>>
>>> *Management console and Pub
I am currently working on integrating Carbon Metrics with Product CEP. For
reporting purposes of memory statistics of CEP (as well as in Siddhi), It
is required to periodically measure how much memory (in bytes) an object
consumes. Even though, it can be achieved through Java Instrumentation. It
is
Hi all,
Event table allows Siddhi to work with stored events, and this can be
viewed as a stored version of Event Stream or a table of events. The
current implementation of Siddhi Event Tables will occupy in-memory storage
to store events. Apart from that, it only provides an extension to work
wit
Hi all,
[+] Senaka.
We tested the above fix with 3000 assets (wsdl - 32, wadl - 08, soapservice
- 2040, restservice - 1040, schema - 27, endpoints -49, policies - 06,
swagger - 06). Following time taken to load the anonymous view of Store
view with and without the fix.
*Without the fix,*
* First
Hi Lahiru,
On Mon, Jan 25, 2016 at 9:12 AM, Lahiru J Ekanayake
wrote:
> Adding isabelle
>
> On Mon, Jan 25, 2016 at 8:21 AM, Lahiru J Ekanayake
> wrote:
>
>> G-Reg/ES Taxonomy Feature
>>
>>
>> *Management console and Publisher Implementation*
>>
>> Taxonomy is the hierarchical classification of
17 matches
Mail list logo