List of Figures
- 1-1 Architecture of the UNIX Connector
- 2-1 Overall Flow of the Process for Creating an Application By Using the Connector
- 3-1 Default Attribute Mappings for UNIX User Account
- 3-2 Default Attribute Mappings for Secondary Group Entitlement
- 3-3 Default Attribute Mappings for Generic UNIX Trusted User Account
- 3-4 Simple Correlation Rule for a UNIX Target Application
- 3-5 Predefined Situations and Responses for a UNIX Target Application
- 3-6 Simple Correlation Rule for a UNIX Authoritative Application
- 3-7 Predefined Situations and Responses for a UNIX Authoritative Application