First page Back Continue Last page Overview Graphics
Authentication Protocol, cont'd.
Opportunity to combine power of the security framework with new, secure authentication methods.
Design protocol, then write security extension to do fine-grained access control.
At connect time, pass auth data to a security hook.
Callbacks on that hook can set client state based on the auth data.
Notes: