Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity

Table Of Contents

Preface
Part I. Getting Started
1.1. What is Spring Security?
1.2. History
1.3. Release Numbering
1.4. Getting the Source
Chapter 2. Security Namespace Configuration
2.1. Introduction
2.1.1. Design of the Namespace
2.2. Getting Started with Security Namespace Configuration
2.2.1. web.xml Configuration
2.2.2. A Minimal <http> Configuration
2.2.3. Using other Authentication Providers
2.3. Advanced Web Features
2.3.1. Remember-Me Authentication
2.3.2. Adding HTTP/HTTPS Channel Security
2.3.3. Concurrent Session Control
2.3.4. OpenID Login
2.3.5. Adding in Your Own Filters
2.3.6. Session Fixation Attack Protection
2.4. Method Security
2.4.1. The <global-method-security> Element
2.4.2. The intercept-methods Bean Decorator
2.5. The Default AccessDecisionManager
2.5.1. Customizing the AccessDecisionManager
2.6. The Default Authentication Manager
3.1. Tutorial Sample
3.2. Contacts
3.3. LDAP Sample
3.4. CAS Sample
3.5. Pre-Authentication Sample
4.1. Issue Tracking
4.2. Becoming Involved
4.3. Further Information
Part II. Overall Architecture
5.3. Authentication
5.3.1. ExceptionTranslationFilter
5.3.2. AuthenticationEntryPoint
5.3.3. AuthenticationProvider
5.3.4. Setting the SecurityContextHolder Contents Directly
5.4. Secure Objects
5.4.1. Security and AOP Advice
5.4.2. AbstractSecurityInterceptor
Chapter 6. Supporting Infrastructure
6.1. Localization
6.2. Filters
6.3. Tag Libraries
6.3.1. Configuration
6.3.2. Usage
Chapter 7. Channel Security
7.1. Overview
7.2. Configuration
7.3. Conclusion
Part III. Authentication
Chapter 8. Common Authentication Services
8.1. Mechanisms, Providers and Entry Points
8.2. UserDetails and Associated Types
8.2.1. In-Memory Authentication
8.2.2. JDBC Authentication
8.3. Concurrent Session Handling
9.2. Configuration
10.1. Overview
10.2. Using LDAP with Spring Security
10.3. Configuring an LDAP Server
10.3.1. Using an Embedded Test Server
10.3.2. Using Bind Authentication
10.3.3. Loading Authorities
10.4. Implementation Classes
10.4.1. LdapAuthenticator Implementations
10.4.2. Connecting to the LDAP Server
10.4.3. LDAP Search Objects
10.4.4. LdapAuthoritiesPopulator
10.4.5. Spring Bean Configuration
10.4.6. LDAP Attributes and Customized UserDetails
Chapter 11. Form Authentication Mechanism
11.1. Overview
11.2. Configuration
Chapter 12. BASIC Authentication Mechanism
12.1. Overview
12.2. Configuration
Chapter 13. Digest Authentication
13.1. Overview
13.2. Configuration
Chapter 14. Remember-Me Authentication
14.1. Overview
14.2. Simple Hash-Based Token Approach
14.3. Persistent Token Approach
14.4. Remember-Me Interfaces and Implementations
14.4.1. TokenBasedRememberMeServices
14.4.2. PersistentTokenBasedRememberMeServices
Chapter 15. Java Authentication and Authorization Service (JAAS) Provider
15.1. Overview
15.2. Configuration
15.2.1. JAAS CallbackHandler
15.2.2. JAAS AuthorityGranter
Chapter 16. Pre-Authentication Scenarios
16.1. Pre-Authentication Framework Classes
16.1.1. AbstractPreAuthenticatedProcessingFilter
16.1.2. AbstractPreAuthenticatedAuthenticationDetailsSource
16.1.3. PreAuthenticatedAuthenticationProvider
16.1.4. PreAuthenticatedProcessingFilterEntryPoint
16.2. Concrete Implementations
16.2.1. Request-Header Authentication (Siteminder)
16.2.2. J2EE Container Authentication
Chapter 17. Anonymous Authentication
17.1. Overview
17.2. Configuration
18.1. Overview
18.2. Adding X.509 Authentication to Your Web Application
18.3. Setting up SSL in Tomcat
19.1. Overview
19.2. How CAS Works
19.3. Configuration of CAS Client
Chapter 20. Run-As Authentication Replacement
20.1. Overview
20.2. Configuration
Chapter 21. Container Adapter Authentication
21.1. Overview
21.2. Adapter Authentication Provider
21.3. Jetty
21.4. JBoss
21.5. Resin
21.6. Tomcat
Part IV. Authorization
Chapter 22. Common Authorization Concepts
22.1. Authorities
22.2. Pre-Invocation Handling
22.2.1. The AccessDecisionManager
22.3. After Invocation Handling
22.3.1. ACL-Aware AfterInvocationProviders
22.3.2. ACL-Aware AfterInvocationProviders (old ACL module)
22.4. Authorization Tag Libraries
Chapter 23. Secure Object Implementations
23.1. AOP Alliance (MethodInvocation) Security Interceptor
23.1.1. Explicit MethodSecurityIterceptor Configuration
23.2. AspectJ (JoinPoint) Security Interceptor
23.3. FilterInvocation Security Interceptor
Chapter 24. Domain Object Security
24.1. Overview
24.2. Key Concepts
24.3. Getting Started
0 of .
Results for:
No results containing your search query
P. 1
SpringSecurityAcegi

SpringSecurityAcegi

Ratings: (0)|Views: 2,185 |Likes:
Published by vanparas

More info:

Published by: vanparas on Apr 07, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

04/07/2011

pdf

text

original

You're Reading a Free Preview
Pages 4 to 25 are not shown in this preview.
You're Reading a Free Preview
Pages 29 to 44 are not shown in this preview.
You're Reading a Free Preview
Pages 48 to 95 are not shown in this preview.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->