To overlay an existing repository with a secured repository:

  1. Modify the Underlying Repository by editing the definitions of the item descriptors you wish to secure.

  2. Configure the Secured Repository Adapter Component component.

  3. Register the Secured Repository Adapter Component.

  4. Create the Secured Repository Definition File, an XML file that specifies access rights and owner information. Access rights are specified with the syntax described in the ACL Syntax section.


Copyright © 1997, 2012 Oracle and/or its affiliates. All rights reserved.

Legal Notices