Open reinout opened 12 years ago
In phase one, only IP based authentication of data providers and consumers is done. In phase two/three, a more refined mechanism should be made.
In phase one, only IP based authentication of data providers and consumers is done. In phase two/three, a more refined mechanism should be made.