InterviewSolution
| 1. |
What Is The Difference Between Zend_auth And Zend_aci? |
|
Answer» Zend Auth is used for authenticating users with variety of authentication methods, including LDAP, OpeniD, and HTTP, Authentication is the process of verifying that the PROVIDED credentials are VALID for the system. By authenticating to your system, your users can prove that they are who they say they are. For more information on Zend Framework’s authentication implementation, SEE the Zend_Auth documentation. Zend_Acl is an implementation of ACCESS Control List (ACL) authorization. Generally speaking, ACLs are lists of roles that are authorized to perform a particular operation on SPECIFIC resources in your system. Zend_AcI can support advanced rule definitions with features such as multiple inheritance for roles and assertions for conditional rules. For more information on Zend_AcI, see the Zend_AcI documentation. Zend Auth and Zend_AcI can be used together to build very sophisticated security systems: first the user confirms their Identity with Zend_Auth, then this Identity is used to assign one or more Zend_AcI roles to the user for authorization to use or modify resources in the system. Zend Auth is used for authenticating users with variety of authentication methods, including LDAP, OpeniD, and HTTP, Authentication is the process of verifying that the provided credentials are valid for the system. By authenticating to your system, your users can prove that they are who they say they are. For more information on Zend Framework’s authentication implementation, see the Zend_Auth documentation. Zend_Acl is an implementation of Access Control List (ACL) authorization. Generally speaking, ACLs are lists of roles that are authorized to perform a particular operation on specific resources in your system. Zend_AcI can support advanced rule definitions with features such as multiple inheritance for roles and assertions for conditional rules. For more information on Zend_AcI, see the Zend_AcI documentation. Zend Auth and Zend_AcI can be used together to build very sophisticated security systems: first the user confirms their Identity with Zend_Auth, then this Identity is used to assign one or more Zend_AcI roles to the user for authorization to use or modify resources in the system. |
|