Expand description
§Advanced Security Framework
Comprehensive security implementation for OxiRS Stream, providing authentication, authorization, encryption, audit logging, and threat detection capabilities.
Structs§
- Abac
Config - Attribute-based access control configuration
- Anomaly
Detection Config - Anomaly detection configuration
- Attribute
Definition - Attribute definition
- Audit
Config - Audit configuration
- Audit
Filter - Audit filter for queries
- Audit
LogEntry - Audit log entry
- Auth
Config - Authentication configuration
- Authz
Config - Authorization configuration
- Encryption
AtRest - Data at rest encryption
- Encryption
Config - Encryption configuration
- Encryption
InTransit - Data in transit encryption
- Escalation
Config - Escalation configuration
- Field
Level Encryption - Field-level encryption
- KeyManagement
- Key management configuration
- KeySize
Preferences - Key size preferences for post-quantum algorithms
- MfaConfig
- Multi-factor authentication configuration
- PQCert
Validation - Post-quantum certificate validation rules
- PQCrypto
Metrics - Post-quantum cryptography metrics
- Password
Policy - Password policy configuration
- Policy
Engine - Policy engine configuration
- Post
Quantum Config - Post-quantum cryptography configuration
- Post
Quantum Crypto Engine - Post-quantum cryptographic engine for advanced security operations
- Post
Quantum KeyPair - Post-quantum key pair
- Quantum
Resistant Certs - Quantum-resistant certificate configuration
- Rate
Limit - Rate limit definition
- Rate
Limit Config - Rate limiting configuration
- Rbac
Config - Role-based access control configuration
- Security
Config - Security configuration
- Security
Context - Security context for requests
- Security
Manager - Security manager
- Security
Metrics - Security metrics
- Session
Config - Session management configuration
- Threat
Alert - Threat alert
- Threat
Context - Threat context
- Threat
Detection Config - Threat detection configuration
- Threat
Response Config - Threat response configuration
- Threat
Rule - Threat detection rule
- Token
Config - Token configuration
Enums§
- Anomaly
Algorithm - Anomaly detection algorithms
- Attribute
Type - Attribute types
- Audit
Event - Audit events
- Audit
LogFormat - Audit log formats
- Audit
Output - Audit output destinations
- Auth
Method - Authentication methods
- Authz
Model - Authorization models
- Credentials
- Credentials for authentication
- Encryption
Algorithm - Encryption algorithms
- KeyDerivation
- Key derivation functions
- KeyProvider
- Key providers
- MfaMethod
- Multi-factor authentication methods
- Permission
- Permissions
- Policy
Language - Policy languages
- Post
Quantum Signature - Post-quantum signature algorithms
- Quantum
Security Level - Quantum security levels (NIST standardization levels)
- Response
Action - Response actions
- Same
Site - SameSite cookie attribute
- Threat
Severity - Threat severity levels
- TlsVersion
- TLS versions
Traits§
- Audit
Logger - Audit logger trait
- Authentication
Provider - Authentication provider trait
- Authorization
Provider - Authorization provider trait
- Rate
Limiter - Rate limiter trait
- Threat
Detector - Threat detector trait