Examples of authorization rules
These examples demonstrate how rules can be implemented.
- Example: ADI from resource manager
This example relies mostly on ADI passed in to the access decision call. The example also requires an ADI container called printQuota to be stored in the requesting user credential or passed in as application context.- Example: ADI from entitlement data
This example shows how a rule works on data that is in the authorization credential.- Example: ADI from dynamic ADI retrieval services
This example evaluates an application-defined XML input document provided by a dynamic entitlement service that was written with the dynamic ADI retrieval service.Parent topic: Authorization rules evaluator