Red Hat ENTERPRISE VIRTUALIZATION FOR DESKTOPS Instalační příručka Strana 6

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 30
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 5
Chapter 1: Introduction
6
Roles: Permissions that control the actions an end user is allowed to take on their desktops and the
level of access they have to the Connection Broker Administrator Web interface.
Assignments: A set of rules that determine which role and policy the Connection Broker assigns to a
user, based on the authentication server the user was found in, the attributes of the users account
in that authentication server, and the location the user is logging in from.
Administrator-defined access control rules map end users to roles and policies. The Connection Broker
maps users to these rules via their authentication server attributes and assigns desktops and applications
from pools, as depicted in the following figure.
How the Connection Broker Manages Users
The following figure illustrates the steps involved in connecting users to desktops. With the exception of
authenticating users, policy logic determines how the Connection Broker handles each step.
Zobrazit stránku 5
1 2 3 4 5 6 7 8 9 10 11 ... 29 30

Komentáře k této Příručce

Žádné komentáře