Configure the LDAP provider  Caveats when using Microsoft ActiveDirectory LDAP servers

Appendix B: Setting Up Authentication and Authorization

Role computation

Role computation techniques are used to list roles for both authenticated and unauthenticated users. The LDAP provider performs access control using roles, and supports three types of role constructs; each may be used independently, or all three may be used at the same time:





Copyright © 2004. Sybase Inc. All rights reserved. Caveats when using Microsoft ActiveDirectory LDAP servers

View this book as PDF