The following security rules are currently installed in the Marmotta system. Security rules are evaluated according to priority. In case a rule matches a request (combination of URL pattern, method, host, and user roles), it fires and triggers either a permission or a rejection. In case a rule does not match, it passes the request over to the next rule in the chain.
Type | Priority | Name | Methods | URL Pattern | Host Pattern | User Roles | Enabled |
---|