General

Profile

Issues

Filters

Apply Clear

# Project Tracker Status Priority Subject Assignee Updated Category
766RequirementsRequirementNewHigh(Requirement) Users should be able to easily assign proxy privileges to other users and to systems acting on their behalf for limited time durationsDave Vieglais2010-08-11 00:11Requirement
8823InfrastructureStoryNewHighRecent Apache and OpenSSL combinations break connectivity on Ubuntu 18.04Dave Vieglais2019-06-19 02:43
767RequirementsRequirementNewHigh(Requirement) Users need to be able to express embargo rules for dataDave Vieglais2010-08-11 00:16Requirement
768RequirementsRequirementNewHigh(Requirement) Need default authz policies that resolve problems associated with inaccessible principalsDave Vieglais2010-08-11 00:34Requirement
765RequirementsRequirementNewHigh(Requirement) Tools can access an API for authn and authzDave Vieglais2010-09-06 20:30Requirement
769RequirementsRequirementNewHigh(Requirement) Authorization should support critical roles, such as curators and system administratorsDave Vieglais2010-09-06 03:02Requirement
764RequirementsRequirementNewHigh(Requirement) Authentication and access control should be consistently availableDave Vieglais2010-09-06 20:32Requirement
770RequirementsRequirementNewHigh(Requirement) Authorization system should be able to express the pseudo-principal concepts like 'public'Dave Vieglais2010-08-11 00:41Requirement
771RequirementsRequirementNewHigh(Requirement) User identities should have simple string serializations that express both the user identity and namespace from which it is drawnDave Vieglais2010-09-06 03:12Requirement
772RequirementsRequirementNewHigh(Requirement) Authentication services should be compatible with existing infrastructure and applicationsDave Vieglais2010-08-11 07:54Requirement
763RequirementsRequirementNewHigh(Requirement) Authentication and authorization services are geographically replicatedDave Vieglais2010-09-06 20:52Requirement
777RequirementsRequirementNewHigh(Requirement) Authorization rules should support common permission levelsDave Vieglais2010-09-06 20:49Requirement
762RequirementsRequirementNewHigh(Requirement) User identities can be derived from existing institutional directory servicesDave Vieglais2010-09-06 03:01Requirement
795RequirementsRequirementNewHigh(Requirement) System must support revocation of user permissionsDave Vieglais2010-08-29 20:45Requirement
761RequirementsRequirementNewHigh(Requirement) Users can specify authorization rules for data objects, science metadata objects, and process artifacts separatelyDave Vieglais2010-09-06 03:06Requirement
820RequirementsRequirementNewHigh(Requirement) Common API for authentication and authorization operationsDave Vieglais2010-09-06 21:23Requirement
384RequirementsRequirementNewHigh(Requirement) Enable efficient mechanisms for users to discover contentDave Vieglais2010-09-06 03:58d1_common_java
821RequirementsRequirementNewHigh(Requirement) Sponsor required functionalityDave Vieglais2010-09-06 03:28d1_common_java
822RequirementsRequirementNewHigh(Requirement) Object access and manipulation should be responsiveDave Vieglais2010-09-06 20:27d1_common_java
411RequirementsRequirementNewHigh(Requirement) The infrastructure must survive destruction of one or more data storage nodesDave Vieglais2010-09-06 03:10d1_common_java
390RequirementsRequirementNewHigh(Requirement) Consistent mechanism for identifying usersDave Vieglais2010-09-06 20:50Requirement
7601InfrastructureBugNewHighCN checksum inconsistenciesDave Vieglais2016-01-26 19:29
393RequirementsRequirementNewHigh(Requirement) Access control rule evaluation must be highly scalable and responsive.Dave Vieglais2010-09-06 20:27Requirement
391RequirementsRequirementNewHigh(Requirement) Enable different classes of users commensurate with their roles.Dave Vieglais2010-09-06 20:51Requirement
318RequirementsRequirementNewHigh(Requirement) Sponsor required Y1 functionalityDave Vieglais2010-09-06 03:24d1_common_java
(1126-1150/1153) Per page: 25, 50, 100, 500

Also available in: Atom CSV PDF

Add picture from clipboard (Maximum size: 14.8 MB)