Author: buildbot
Date: Tue Nov 25 11:01:12 2014
New Revision: 930421

Log:
Staging update by buildbot for ace

Modified:
    websites/staging/ace/trunk/content/   (props changed)
    websites/staging/ace/trunk/content/docs/using-basic-auth.html

Propchange: websites/staging/ace/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Tue Nov 25 11:01:12 2014
@@ -1 +1 @@
-1641565
+1641566

Modified: websites/staging/ace/trunk/content/docs/using-basic-auth.html
==============================================================================
--- websites/staging/ace/trunk/content/docs/using-basic-auth.html (original)
+++ websites/staging/ace/trunk/content/docs/using-basic-auth.html Tue Nov 25 
11:01:12 2014
@@ -101,9 +101,18 @@
       <p><a href="/"><i class='icon-home'></i> Home</a>&nbsp;&raquo&nbsp;<a 
href="/docs/">Docs</a></p>
       <h1>ACE Authentication</h1>
       <div class="clear"></div>
-      <div id="content"><div class="toc">
+      <div id="content"><p>When provisioning software (partly) to targets, one 
has to rely upon the trustworthiness
+of both the network and the target. Even if everything is under your control 
and
+governance, one cannot entirely be sure that unwanted access takes place. A 
first step in
+order to prevent unwanted access is <em>authentication</em>, which gives you 
the ability to
+verify the identity of someone. Once the identity is known, one can apply 
<em>authorization</em>
+in order to determine what actions are allowed and which are not.  In this 
article, the
+recently added authentication layer of ACE is explained in more depth and how 
to configure
+authentication to your situation.</p>
+<p>More details on the design of the authentication mechanism in ACE can be 
found in the
+<a href="/docs/design/authentication-design.mdtext">design 
documentation</a>.</p>
+<div class="toc">
 <ul>
-<li><a href="#introduction">Introduction</a></li>
 <li><a href="#configuring-authentication">Configuring authentication</a><ul>
 <li><a href="#remote-services">Remote services</a></li>
 <li><a href="#the-connection-factory">The connection factory</a></li>
@@ -115,17 +124,6 @@
 <li><a href="#notes">Notes</a></li>
 </ul>
 </div>
-<h2 id="introduction">Introduction</h2>
-<p>When provisioning software (partly) to targets, one has to rely upon the 
trustworthiness
-of both the network and the target. Even if everything is under your control 
and
-governance, one cannot entirely be sure that unwanted access takes place. A 
first step in
-order to prevent unwanted access is <em>authentication</em>, which gives you 
the ability to
-verify the identity of someone. Once the identity is known, one can apply 
<em>authorization</em>
-in order to determine what actions are allowed and which are not.  In this 
article, the
-recently added authentication layer of ACE is explained in more depth and how 
to configure
-authentication to your situation.
-More details on the design of the authentication mechanism in ACE can be found 
in the
-<a href="/docs/design/authentication-design.mdtext">design 
documentation</a>.</p>
 <h2 id="configuring-authentication">Configuring authentication</h2>
 <p>By default, ACE has no form of authentication enabled. While this is 
sufficient for
 demonstration purposes, you might want to change this prior to putting ACE into


Reply via email to