Hi Cyril, As I told you in a separate email we're finishing the development of the security Proxy at UPM. The last step is to make requests to the Access Control GE, but we've some questions: - Regarding Juanjo's email, we can develop two different solutions. In the first one we can send you the OAuth token and you'll validate it against the IDM and then check the corresponding permissions. In the second one we can validate the oauth token against IDM and then send the user info (mainly roles) to the Access Control GE. Can you send us examples of both types of request? (one sends OAuth token and the other user roles). - The other question is related to the certificates we have to use. We are implementing a centralized proxy that makes requests to the Access Control GE, but we're concerned with scalability so we're thinking of installing one proxy per application. Could we use the same certificate for all proxies we will use? If not, the best solution would be to use the centralized proxy. Thank you! Cheers, Javier. -------------- next part -------------- An HTML attachment was scrubbed... URL: <https://lists.fiware.org/private/fiware-api-cross/attachments/20130724/50c6f837/attachment.html>
You can get more information about our cookies and privacy policies clicking on the following links: Privacy policy Cookies policy