- Indico style
- Indico style - inline minutes
- Indico style - numbered
- Indico style - numbered + minutes
- Indico Weeks View
https://chalmers.zoom.us/j/69573896543
Passcode: FAIR
https://docs.google.com/document/d/12rttHPhNZ2o-kTVHRpnfco535idQoBDCh_pyGu1562I/edit?usp=sharing
(a) This is the right solution and I wish we could make ppl understand that it represents a higher level of security;
"Ahh" says the ITSEC person at site B "but we are protected by whitelisting of IP addresses"
BUT the person from site A moves to site C, which is whitelisted. The person still has access to the system even if their new job doesn’t require it
'UDA' must be extended to allow not only `X.509` based authentication/authorization but also one based on bearer tokens (OAuth2.0 Access Tokens).
==> This should be possible, but means you cant access ITER data which requires X509
This is why we need changes inside UDA - it must support other means of authentication as well.
by default, any authenticated user is granted very limited access,
==> not sure what you are envisaging here
We can either allow people to access data directly inside CatalogQT or we can do it at experiment side.
If we decide to allow people access sites by giving them access rigths inside CatalogQT, we assume that people start with very limitted power and can get more by requesting particular features - e.g. accessing external sites.
In this case, external sites have to trust us - I am not sure if this is possible.