The Oak Security Layer
General
Introduction to Oak Security
Security Reports
Authentication
Overview
Differences wrt Jackrabbit 2.x
Authentication : Implementation Details
Pre-Authentication
Extensions
Token Authentication and Token Management
External Authentication
User and Group Synchronization
Identity Management
LDAP Integration
Authorization
Overview
Access Control Management
Permission Evaluation
Combining Multiple Authorization Models
Access Control Management
Overview
Differences wrt Jackrabbit 2.x
Access Control Management : The Default Implementation
Using the API
Permissions
Overview
Permissions vs Privileges
Differences wrt Jackrabbit 2.x
Permissions : The Default Implementation
Permission Evaluation in Detail
Privilege Management
Overview
Differences wrt Jackrabbit 2.x
Privilege Management : The Default Implementation
Mapping Privileges to Items and API Calls
Mapping Privileges to Items
Mapping API Calls to Privileges
Extensions
Restriction Management
Managing Access with Closed User Groups (CUG)
Managing Access by Principal
Principal Management
Overview
Differences wrt Jackrabbit 2.x
Principal Management : The Default Implementation
User Management
Overview
Differences wrt Jackrabbit 2.x
User Management : The Default Implementation
Group Membership
Authorizable Actions
Group Actions
User Actions
Authorizable Node Name Generation
Password Expiry and Force Initial Password Change
Password History
Searching Users and Groups