Author: jawi
Date: Tue Nov 25 11:01:07 2014
New Revision: 1641566
URL: http://svn.apache.org/r1641566
Log:
Minor layout improvement.
Modified:
ace/site/trunk/content/docs/using-basic-auth.mdtext
Modified: ace/site/trunk/content/docs/using-basic-auth.mdtext
URL:
http://svn.apache.org/viewvc/ace/site/trunk/content/docs/using-basic-auth.mdtext?rev=1641566&r1=1641565&r2=1641566&view=diff
==============================================================================
--- ace/site/trunk/content/docs/using-basic-auth.mdtext (original)
+++ ace/site/trunk/content/docs/using-basic-auth.mdtext Tue Nov 25 11:01:07 2014
@@ -1,9 +1,5 @@
Title: ACE Authentication
-[TOC]
-
-## Introduction
-
When provisioning software (partly) to targets, one has to rely upon the
trustworthiness
of both the network and the target. Even if everything is under your control
and
governance, one cannot entirely be sure that unwanted access takes place. A
first step in
@@ -12,10 +8,13 @@ verify the identity of someone. Once the
in order to determine what actions are allowed and which are not. In this
article, the
recently added authentication layer of ACE is explained in more depth and how
to configure
authentication to your situation.
+
More details on the design of the authentication mechanism in ACE can be found
in the
[design documentation](/docs/design/authentication-design.mdtext).
+[TOC]
+
## Configuring authentication
By default, ACE has no form of authentication enabled. While this is
sufficient for