Cette page n'est pas encore disponible dans votre langue. Nous nous efforçons d'ajouter d'autres langues. Nous vous remercions de votre compréhension.

On this page

Show all

Authentication Process

Updated on 2022-09-15 GMT+08:00

When a user initiates an access request, the system authenticates the request based on the actions in the policies that have been attached to the group to which the user belongs. The following diagram shows the authentication process.

Figure 1 Authentication process

  1. A user initiates an access request.
  2. The system looks for a Deny among the applicable actions of the policies from which the user gets permissions. If the system finds an applicable Deny, it returns a decision of Deny, and the authentication ends.
  3. If no Deny is found applicable, the system looks for an Allow that would apply to the request. If the system finds an applicable Allow, it returns a decision of Allow, and the authentication ends.
  4. If no Allow is found applicable, the system returns a decision of Deny, and the authentication ends.
Feedback

Feedback

Feedback

0/500

Selected Content

Submit selected content with the feedback