Cluster and cache operations can be restricted, intercepted and modifed, or completely blocked based on configured access rights set for the various cluster components.

  • Implementing Authorization

    To use authorization for client/server systems, your client connections must be authenticated by their servers.

  • Authorization Example

    This topic discusses the authorization example provided in the product under templates/security using,, and authz6_0.dtd.