Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Sensitive Sub Resource Access

NOTE: The examples demonstrate how to manage secure access with the adaptors resource but similar situations could apply with other resources.

GET /.../* may not be desireable since it would allow access resources that should be accessed by only the admin. For example:

...