Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Acegi Security

Acegi Security

Ratings: (0)|Views: 420|Likes:
Published by deepakrm

More info:

Published by: deepakrm on Jun 21, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF or read online from Scribd
See more
See less

10/18/2011

 
Acegi Security
Reference Documentation
1.0.7
Ben Alex
 
Table of Contents
Preface............................................................................................................................................vI. Overall Architecture...................................................................................................................11. Introduction........................................................................................................................21.1. What is Acegi Security?..........................................................................................21.2. History.....................................................................................................................31.3. Release Numbering.................................................................................................42. Technical Overview...........................................................................................................52.1. Runtime Environment.............................................................................................52.2. Shared Components................................................................................................52.3. Authentication.........................................................................................................72.4. Secure Objects........................................................................................................92.5. Conclusion............................................................................................................113. Supporting Infrastructure.................................................................................................123.1. Localization...........................................................................................................123.2. Filters....................................................................................................................134. Channel Security..............................................................................................................164.1. Overview...............................................................................................................164.2. Configuration........................................................................................................164.3. Conclusion............................................................................................................175. Tag Libraries....................................................................................................................195.1. Overview...............................................................................................................195.2. Configuration........................................................................................................195.3. Usage.....................................................................................................................19II. Authentication.........................................................................................................................206. Common Authentication Services...................................................................................216.1. Mechanisms, Providers and Entry Points.............................................................216.2. UserDetails and Associated Types........................................................................236.2.1. In-Memory Authentication........................................................................246.2.2. JDBC Authentication.................................................................................256.3. Concurrent Session Handling...............................................................................256.4. Authentication Tag Libraries................................................................................267. DAO Authentication Provider.........................................................................................277.1. Overview...............................................................................................................277.2. Configuration........................................................................................................278. Java Authentication and Authorization Service (JAAS) Provider...................................298.1. Overview...............................................................................................................298.2. Configuration........................................................................................................298.2.1. JAAS CallbackHandler..............................................................................298.2.2. JAAS AuthorityGranter.............................................................................309. Siteminder Authentication Mechanism............................................................................319.1. Overview...............................................................................................................319.2. Configuration........................................................................................................3110. Run-As Authentication Replacement............................................................................3310.1. Overview.............................................................................................................3310.2. Configuration......................................................................................................3311. Form Authentication Mechanism..................................................................................3511.1. Overview.............................................................................................................35Acegi Security 1.0.7 ii
 
11.2. Configuration......................................................................................................3512. BASIC Authentication Mechanism...............................................................................3612.1. Overview.............................................................................................................3612.2. Configuration......................................................................................................3613. Digest Authentication....................................................................................................3713.1. Overview.............................................................................................................3713.2. Configuration......................................................................................................3814. Anonymous Authentication...........................................................................................3914.1. Overview.............................................................................................................3914.2. Configuration......................................................................................................3915. Remember-Me Authentication.......................................................................................4115.1. Overview.............................................................................................................4115.2. Configuration......................................................................................................4116. X509 Authentication......................................................................................................4316.1. Overview.............................................................................................................4316.2. Using X509 with Acegi Security........................................................................4316.3. Configuration......................................................................................................4417. LDAP Authentication....................................................................................................4517.1. Overview.............................................................................................................4517.2. Using LDAP with Acegi Security.......................................................................4517.2.1. LdapAuthenticator Implementations.......................................................4517.2.2. Connecting to the LDAP Server..............................................................4617.2.3. LDAP Search Objects..............................................................................4617.3. Configuration......................................................................................................4718. CAS Authentication.......................................................................................................4818.1. Overview.............................................................................................................4818.2. How CAS Works................................................................................................4818.3. Optional CAS Server Setup................................................................................5118.3.1. CAS Version 2.0......................................................................................5118.3.2. CAS Version 3.0......................................................................................5218.4. Configuration of CAS Client..............................................................................5318.5. Advanced Issues..................................................................................................5619. Container Adapter Authentication.................................................................................5719.1. Overview.............................................................................................................5719.2. Adapter Authentication Provider........................................................................5719.3. Jetty.....................................................................................................................5819.4. JBoss...................................................................................................................5919.5. Resin...................................................................................................................6019.6. Tomcat................................................................................................................61III. Authorization.........................................................................................................................6320. Common Authorization Concepts..................................................................................6420.1. Authorities...........................................................................................................6420.2. Pre-Invocation Handling.....................................................................................6420.3. After Invocation Handling..................................................................................6720.3.1. ACL-Aware AfterInvocationProviders....................................................6820.3.2. ACL-Aware AfterInvocationProviders (old ACL module).....................6920.4. Authorization Tag Libraries................................................................................6921. Secure Object Implementations.....................................................................................7121.1. AOP Alliance (MethodInvocation) Security Interceptor....................................7121.2. AspectJ (JoinPoint) Security Interceptor............................................................7321.3. FilterInvocation Security Interceptor..................................................................7522. Domain Object Security.................................................................................................78Acegi SecurityAcegi Security 1.0.7 iii

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->