Contexts

Contents

Introduction

Several KMSG_CRED messages and many messages depend on the selections that the user has made on the user interface. The UI context functions and data structures provide access to this information.

The Network Identity Manager user interface presents an outline view of all the credentials that were provided by credentials providers. This view consists of headers representing the outline levels and rows representing individual credentials.

Users can make multiple selections of credentials or headers from this view. If all the credentials and subheaders under a particular outline level are selected, then the header itself is automatically selected. There may be multiple disjointed selections of headers and credentials.

In addition, the current cursor position also acts as a selector. The credential or header under the cursor may not actually be selected. The cursor is not the mouse pointer, but the focus rectangle that may be moved either using the keyboard or by clicking on a credential or header.

Thus there are two independent groups of selections:

There are a few notes on how credentials are selected:

How the UI context is used when processing a specific action or message depends on the action or message. If an action operates on a group of credentials, then the current selection may be used, and on the other hand if an action or message relates to just one credential, identity or credential type is invoked, then the cursor selection is invoked.

For example, double-clicking a credential, or right clicking and selecting 'Properties' from the context menu launches the property window for a credential. This operates on the cursor selection since that reflects where the user double clicked. However, choosing 'Destroy' from the context menu invokes a command that can be applied to a group of credential, and hence uses the current selection.

Next: Using Contexts


Generated on Fri Aug 3 08:27:13 2007 for Network Identity Manager by Doxygen 1.5.2
© 2004-2007 Massachusetts Institute of Technology.
© 2005-2007 Secure Endpoints Inc.
Contact khimaira@mit.edu