Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this
1Activity
×

Table Of Contents

Preface
Part I. Overall Architecture
1.1. What is Acegi Security?
1.2. History
1.3. Release Numbering
2.1. Runtime Environment
2.2. Shared Components
2.3. Authentication
2.4. Secure Objects
2.5. Conclusion
Chapter 3. Supporting Infrastructure
3.1. Localization
3.2. Filters
<filter>
4.1. Overview
4.2. Configuration
4.3. Conclusion
5.1. Overview
5.2. Configuration
5.3. Usage
Part II. Authentication
6.2. UserDetails and Associated Types
6.2.1. In-Memory Authentication
6.2.2. JDBC Authentication
6.3. Concurrent Session Handling
6.4. Authentication Tag Libraries
Chapter 7. DAO Authentication Provider
7.1. Overview
7.2. Configuration
Chapter 8. Java Authentication and Authorization Service (JAAS) Provider
8.1. Overview
8.2. Configuration
8.2.1. JAAS CallbackHandler
8.2.2. JAAS AuthorityGranter
Chapter 9. Siteminder Authentication Mechanism
9.1. Overview
9.2. Configuration
10.1. Overview
10.2. Configuration
Chapter 11. Form Authentication Mechanism
11.1. Overview
11.2. Configuration
Chapter 12. BASIC Authentication Mechanism
12.1. Overview
12.2. Configuration
Chapter 13. Digest Authentication
13.1. Overview
13.2. Configuration
Chapter 14. Anonymous Authentication
14.1. Overview
14.2. Configuration
15.2. Configuration
16.1. Overview
16.2. Using X509 with Acegi Security
16.3. Configuration
17.1. Overview
17.2. Using LDAP with Acegi Security
17.2.1. LdapAuthenticator Implementations
17.2.2. Connecting to the LDAP Server
17.2.3. LDAP Search Objects
17.3. Configuration
18.1. Overview
18.2. How CAS Works
18.3. Optional CAS Server Setup
18.3.1. CAS Version 2.0
18.3.2. CAS Version 3.0
18.4. Configuration of CAS Client
18.5. Advanced Issues
Chapter 19. Container Adapter Authentication
19.1. Overview
19.2. Adapter Authentication Provider
19.3. Jetty
19.4. JBoss
19.5. Resin
19.6. Tomcat
Part III. Authorization
Chapter 20. Common Authorization Concepts
20.1. Authorities
20.2. Pre-Invocation Handling
20.3. After Invocation Handling
20.3.1. ACL-Aware AfterInvocationProviders
20.3.2. ACL-Aware AfterInvocationProviders (old ACL module)
20.4. Authorization Tag Libraries
Chapter 21. Secure Object Implementations
21.1. AOP Alliance (MethodInvocation) Security Interceptor
MethodSecurityInterceptor
21.2. AspectJ (JoinPoint) Security Interceptor
21.3. FilterInvocation Security Interceptor
Chapter 22. Domain Object Security
22.1. Overview
22.2. Key Concepts
Chapter 23. Domain Object Security (old ACL module)
23.1. Overview
23.2. Basic ACL Package
Part IV. Other Resources
24.1. Contacts
24.2. Tutorial Sample
25.1. Use JIRA for Issue Tracking
25.2. Becoming Involved
25.3. Further Information
0 of .
Results for:
No results containing your search query
P. 1
springsecurity

springsecurity

Ratings: (0)|Views: 569|Likes:
Published by cuongvm6037

More info:

Published by: cuongvm6037 on Feb 09, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

11/14/2011

pdf

text

original

You're Reading a Free Preview
Pages 4 to 25 are not shown in this preview.
You're Reading a Free Preview
Pages 29 to 44 are not shown in this preview.
You're Reading a Free Preview
Pages 48 to 95 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->