diff options
| author | Chris McDonough <chrism@agendaless.com> | 2009-01-17 21:13:35 +0000 |
|---|---|---|
| committer | Chris McDonough <chrism@agendaless.com> | 2009-01-17 21:13:35 +0000 |
| commit | 041897caf1f765d0edffcc3a1af2787714f308ca (patch) | |
| tree | fb4db3d622de017c955d588d23a0e3a1b072bcbb /docs/narr/security.rst | |
| parent | eff4620c56f38c32113cd452b18b8af8f8cd1bbd (diff) | |
| download | pyramid-041897caf1f765d0edffcc3a1af2787714f308ca.tar.gz pyramid-041897caf1f765d0edffcc3a1af2787714f308ca.tar.bz2 pyramid-041897caf1f765d0edffcc3a1af2787714f308ca.zip | |
Security policy documentation.
Diffstat (limited to 'docs/narr/security.rst')
| -rw-r--r-- | docs/narr/security.rst | 22 |
1 files changed, 16 insertions, 6 deletions
diff --git a/docs/narr/security.rst b/docs/narr/security.rst index f511f402d..4afb04258 100644 --- a/docs/narr/security.rst +++ b/docs/narr/security.rst @@ -31,12 +31,22 @@ However, if you add the following bit of code to your application's The above inscrutable stanza enables the ``RemoteUserACLSecurityPolicy`` to be in effect for every request to your application. The ``RemoteUserACLSecurityPolicy`` is a policy -which compares the ``REMOTE_USER`` variable passed in the reqest's -environment (as the sole :term:`principal`) against any *ACL* found in -model data when attempting to call some :term:`view`. The policy -either allows the view that the permission was declared for to be -called, or returns a ``401 Unathorized`` response code to the upstream -WSGI server. +which compares the ``REMOTE_USER`` variable passed in the request's +environment (as the sole :term:`principal`) against the principals +present in any :term:`ACL` found in model data when attempting to call +some :term:`view`. The policy either allows the view that the +permission was declared for to be called, or returns a ``401 +Unathorized`` response code to the upstream WSGI server. + +.. note:: Another security policy also exists: + ``RepozeWhoIdentityACLSecurityPolicy``. This policy uses principal + information found in the ``repoze.who.identity`` value set into the + WSGI environment by the :term:`repoze.who` middleware rather than + ``REMOTE_USER`` information. This policy only works when + :term:`repoze.who` middleware is present in the WSGI pipeline. + +.. note:: See :ref:`security_policies_api_section` for more + information about the features of the default security policies. Protecting Views with Permissions --------------------------------- |
