nsis-5----Page:2
1  2  3  4 

Motivation
When deploying protocols the deployment environment needs to be considered.

Allow the protocol to use credentials used in this environment

This document
analyses the usage of different security protocols (and credentials) with GIST.
discusses API considerations
when the authenticated identity needs to be passed from the GIST to NSLPs and
security policies from the NSLP to GIST.
PPT Version