List of Figures
- 2-1 Architectural Detail of an Access Client
- 2-2 Process Overview: Handling a Resource Request
- 2-3 Process Flow for Form-based Applications
- 3-1 Custom Plug-in Deployment Workflow
- 3-2 Authentication Model and Plug-ins
- 3-3 Plug-in Package Hierarchy
- 3-4 Plug-in Class Hierarchy
- 3-5 Plug-in Interface Hierarchy
- 3-6 Plug-in Annotation Type Hierarchy
- 3-7 Plug-in Enum Hierarchy
- 3-8 Database User Authentication Plug-in Part 1
- 3-9 Database User Authentication Plug-in Part 2
- 3-10 Database User Authentication Plug-in Part 3
- 3-11 XSD Configuration Data: Database User Authentication Plug-in
- 4-1 Authentication Request Flow
- 4-2 Unarchived WAR
- 5-1 Policy Model
- 5-2 Policy Contents
- 11-1 Custom Actions Plug-in Flow