You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ace.apache.org by ja...@apache.org on 2014/11/25 12:01:07 UTC
svn commit: r1641566 - /ace/site/trunk/content/docs/using-basic-auth.mdtext
Author: jawi
Date: Tue Nov 25 11:01:07 2014
New Revision: 1641566
URL: http://svn.apache.org/r1641566
Log:
Minor layout improvement.
Modified:
ace/site/trunk/content/docs/using-basic-auth.mdtext
Modified: ace/site/trunk/content/docs/using-basic-auth.mdtext
URL: http://svn.apache.org/viewvc/ace/site/trunk/content/docs/using-basic-auth.mdtext?rev=1641566&r1=1641565&r2=1641566&view=diff
==============================================================================
--- ace/site/trunk/content/docs/using-basic-auth.mdtext (original)
+++ ace/site/trunk/content/docs/using-basic-auth.mdtext Tue Nov 25 11:01:07 2014
@@ -1,9 +1,5 @@
Title: ACE Authentication
-[TOC]
-
-## Introduction
-
When provisioning software (partly) to targets, one has to rely upon the trustworthiness
of both the network and the target. Even if everything is under your control and
governance, one cannot entirely be sure that unwanted access takes place. A first step in
@@ -12,10 +8,13 @@ verify the identity of someone. Once the
in order to determine what actions are allowed and which are not. In this article, the
recently added authentication layer of ACE is explained in more depth and how to configure
authentication to your situation.
+
More details on the design of the authentication mechanism in ACE can be found in the
[design documentation](/docs/design/authentication-design.mdtext).
+[TOC]
+
## Configuring authentication
By default, ACE has no form of authentication enabled. While this is sufficient for