summaryrefslogtreecommitdiff
path: root/docs/narr/security.rst
diff options
context:
space:
mode:
authorChris McDonough <chrism@agendaless.com>2009-01-17 21:13:35 +0000
committerChris McDonough <chrism@agendaless.com>2009-01-17 21:13:35 +0000
commit041897caf1f765d0edffcc3a1af2787714f308ca (patch)
treefb4db3d622de017c955d588d23a0e3a1b072bcbb /docs/narr/security.rst
parenteff4620c56f38c32113cd452b18b8af8f8cd1bbd (diff)
downloadpyramid-041897caf1f765d0edffcc3a1af2787714f308ca.tar.gz
pyramid-041897caf1f765d0edffcc3a1af2787714f308ca.tar.bz2
pyramid-041897caf1f765d0edffcc3a1af2787714f308ca.zip
Security policy documentation.
Diffstat (limited to 'docs/narr/security.rst')
-rw-r--r--docs/narr/security.rst22
1 files changed, 16 insertions, 6 deletions
diff --git a/docs/narr/security.rst b/docs/narr/security.rst
index f511f402d..4afb04258 100644
--- a/docs/narr/security.rst
+++ b/docs/narr/security.rst
@@ -31,12 +31,22 @@ However, if you add the following bit of code to your application's
The above inscrutable stanza enables the
``RemoteUserACLSecurityPolicy`` to be in effect for every request to
your application. The ``RemoteUserACLSecurityPolicy`` is a policy
-which compares the ``REMOTE_USER`` variable passed in the reqest's
-environment (as the sole :term:`principal`) against any *ACL* found in
-model data when attempting to call some :term:`view`. The policy
-either allows the view that the permission was declared for to be
-called, or returns a ``401 Unathorized`` response code to the upstream
-WSGI server.
+which compares the ``REMOTE_USER`` variable passed in the request's
+environment (as the sole :term:`principal`) against the principals
+present in any :term:`ACL` found in model data when attempting to call
+some :term:`view`. The policy either allows the view that the
+permission was declared for to be called, or returns a ``401
+Unathorized`` response code to the upstream WSGI server.
+
+.. note:: Another security policy also exists:
+ ``RepozeWhoIdentityACLSecurityPolicy``. This policy uses principal
+ information found in the ``repoze.who.identity`` value set into the
+ WSGI environment by the :term:`repoze.who` middleware rather than
+ ``REMOTE_USER`` information. This policy only works when
+ :term:`repoze.who` middleware is present in the WSGI pipeline.
+
+.. note:: See :ref:`security_policies_api_section` for more
+ information about the features of the default security policies.
Protecting Views with Permissions
---------------------------------