Author: marrs
Date: Wed Apr 25 09:58:38 2012
New Revision: 1330179

URL: http://svn.apache.org/viewvc?rev=1330179&view=rev
Log:
Fixed a typo.

Modified:
    ace/site/trunk/content/dev-doc/design/ace-authentication.mdtext

Modified: ace/site/trunk/content/dev-doc/design/ace-authentication.mdtext
URL: 
http://svn.apache.org/viewvc/ace/site/trunk/content/dev-doc/design/ace-authentication.mdtext?rev=1330179&r1=1330178&r2=1330179&view=diff
==============================================================================
--- ace/site/trunk/content/dev-doc/design/ace-authentication.mdtext (original)
+++ ace/site/trunk/content/dev-doc/design/ace-authentication.mdtext Wed Apr 25 
09:58:38 2012
@@ -5,7 +5,7 @@ last updated: April 24th, 2012
 
 ## Introduction
 
-When provisioning software (partly) to targets, one has to rely upon the 
trustworthiness of both the network and the target. Even if everything is under 
your control and governance, one cannot entirely be sure that unwanted access 
takes place. A first step in order to prevent unwanted access is 
*authentication*, which gives you the ability to verify the identity of 
someone. Once the identity is known, one can apply *authentication* in order to 
determine what actions are allowed and which are not.
+When provisioning software (partly) to targets, one has to rely upon the 
trustworthiness of both the network and the target. Even if everything is under 
your control and governance, one cannot entirely be sure that unwanted access 
takes place. A first step in order to prevent unwanted access is 
*authentication*, which gives you the ability to verify the identity of 
someone. Once the identity is known, one can apply *authorization* in order to 
determine what actions are allowed and which are not.
 In this article, the recently added authentication layer of ACE is explained 
in more depth, and some details on how extensions can be written for additional 
mechanisms are given. The remainder of this article assumes the reader has 
basic knowledge of the principles behind ACE, and has sufficient programming 
skills. For this article, the latest code of ACE (0.8.1-SNAPSHOT, rev.1329269) 
was used.
 
 


Reply via email to