From: <sco...@jb...> - 2005-05-20 14:42:41
|
Give some specific examples of more complicated authorization rules. Your choices are: 1. If the rules can be decomposed into a user having a set of roles, the existing JAAS mechanism can be used. 2. If the rules require more logic, but can be expressed using custom java.security.Permission objects, you can use the java.security.Policy mechanism to assign permissions to users and test the permissions using the Policy.implies check similar to how JACC works. 3. If the permission rules just don't fit Permissions, we need a new security service that layers on top of the others and employs a rules engine to help with the permissions evaluations. View the original post : http://www.jboss.org/index.html?module=bb&op=viewtopic&p=3878552#3878552 Reply to the post : http://www.jboss.org/index.html?module=bb&op=posting&mode=reply&p=3878552 |