General

Profile

Issues

Filters

Apply Clear

# Project Tracker Status Priority Subject Assignee Updated Category
766RequirementsRequirementNewHigh(Requirement) Users should be able to easily assign proxy privileges to other users and to systems acting on their behalf for limited time durationsDave Vieglais2010-08-11 00:11Requirement
765RequirementsRequirementNewHigh(Requirement) Tools can access an API for authn and authzDave Vieglais2010-09-06 20:30Requirement
764RequirementsRequirementNewHigh(Requirement) Authentication and access control should be consistently availableDave Vieglais2010-09-06 20:32Requirement
393RequirementsRequirementNewHigh(Requirement) Access control rule evaluation must be highly scalable and responsive.Dave Vieglais2010-09-06 20:27Requirement
392RequirementsRequirementNewHigh(Requirement) Identity and access control should be interoperable across datanetsDave Vieglais2010-09-06 20:31Requirement
777RequirementsRequirementNewHigh(Requirement) Authorization rules should support common permission levelsDave Vieglais2010-09-06 20:49Requirement
391RequirementsRequirementNewHigh(Requirement) Enable different classes of users commensurate with their roles.Dave Vieglais2010-09-06 20:51Requirement
390RequirementsRequirementNewHigh(Requirement) Consistent mechanism for identifying usersDave Vieglais2010-09-06 20:50Requirement
768RequirementsRequirementNewHigh(Requirement) Need default authz policies that resolve problems associated with inaccessible principalsDave Vieglais2010-08-11 00:34Requirement
795RequirementsRequirementNewHigh(Requirement) System must support revocation of user permissionsDave Vieglais2010-08-29 20:45Requirement
772RequirementsRequirementNewHigh(Requirement) Authentication services should be compatible with existing infrastructure and applicationsDave Vieglais2010-08-11 07:54Requirement
769RequirementsRequirementNewHigh(Requirement) Authorization should support critical roles, such as curators and system administratorsDave Vieglais2010-09-06 03:02Requirement
770RequirementsRequirementNewHigh(Requirement) Authorization system should be able to express the pseudo-principal concepts like 'public'Dave Vieglais2010-08-11 00:41Requirement
763RequirementsRequirementNewHigh(Requirement) Authentication and authorization services are geographically replicatedDave Vieglais2010-09-06 20:52Requirement
771RequirementsRequirementNewHigh(Requirement) User identities should have simple string serializations that express both the user identity and namespace from which it is drawnDave Vieglais2010-09-06 03:12Requirement
762RequirementsRequirementNewHigh(Requirement) User identities can be derived from existing institutional directory servicesDave Vieglais2010-09-06 03:01Requirement
580RequirementsRequirementNewLow(Requirement) All software developed on the project should be open sourceDave Vieglais2010-04-15 22:57
383RequirementsRequirementNewLow(Requirement) System supports data storage2010-03-16 21:35
468RequirementsRequirementNewLow(Requirement) Design the cyberinfrastructure for the project.2010-03-25 16:51
388RequirementsRequirementNewLow(Requirement) Implement a Member Node based on Dryad2010-03-24 13:36
339RequirementsRequirementNewLow(Requirement) Web presence to provide publicly accessible information about the project2010-03-16 17:36
408RequirementsRequirementNewLow(Requirement) Implement a Coordinating Node software stack2010-03-25 15:44
387RequirementsRequirementNewLow(Requirement) Implement a Member Node based on Metacat2010-10-06 22:00
386RequirementsRequirementNewLow(Requirement) Deploy at least three Member Nodes2010-03-17 13:39
385RequirementsRequirementNewLow(Requirement) Support arbitrary unique identifiers2010-03-16 22:09
(976-1000/1153) Per page: 25, 50, 100, 500

Also available in: Atom CSV PDF

Add picture from clipboard (Maximum size: 14.8 MB)