Authentication and Access Control with Sentry 2 (part 2)
As promised, IBM developerWorks has now published the second part of my article on Sentry 2. In this concluding segment, I dive into the Sentry 2 permission model, explaining how to create groups, assign users and permissions to them, and use permission checks to selectively enable application functions. Also on the menu: find out how to harden your application with login throttling and temporary user deactivation, and integrate Sentry 2… Read More »Authentication and Access Control with Sentry 2 (part 2)