Minor doc updates
This commit is contained in:
parent
0da99171da
commit
217cffbdbc
|
@ -217,7 +217,7 @@
|
|||
xlink:href="http://www.springsource.com/download/community?project=Spring%20Security"
|
||||
>download page</link>, download individual jars (and sample WAR files) from the
|
||||
Maven Central repository (or a SpringSource Maven repository for snapshot and milestone
|
||||
releases). Alternatively, you can build the project from source yourself. See the
|
||||
releases) or, alternatively, you can build the project from source yourself. See the
|
||||
project web site for more details. </para>
|
||||
<section xml:id="modules">
|
||||
<title>Project Modules</title>
|
||||
|
@ -233,7 +233,8 @@
|
|||
<para>Contains core authentication and access-contol classes and interfaces,
|
||||
remoting support and basic provisioning APIs. Required by any application which
|
||||
uses Spring Security. Supports standalone applications, remote clients, method
|
||||
(service layer) security and JDBC user provisioning. Contains the top-level packages:<itemizedlist><listitem><para><literal>org.springframework.security.core</literal></para></listitem><listitem><para><literal>org.springframework.security.access</literal></para></listitem><listitem><para><literal>org.springframework.security.authentication</literal></para></listitem><listitem><para><literal>org.springframework.security.provisioning</literal></para></listitem><listitem><para><literal>org.springframework.security.remoting</literal></para></listitem></itemizedlist></para>
|
||||
(service layer) security and JDBC user provisioning. Contains the top-level
|
||||
packages:<itemizedlist><listitem><para><literal>org.springframework.security.core</literal></para></listitem><listitem><para><literal>org.springframework.security.access</literal></para></listitem><listitem><para><literal>org.springframework.security.authentication</literal></para></listitem><listitem><para><literal>org.springframework.security.provisioning</literal></para></listitem><listitem><para><literal>org.springframework.security.remoting</literal></para></listitem></itemizedlist></para>
|
||||
</section>
|
||||
<section xml:id="spring-security-web">
|
||||
<title>Web - <literal>spring-security-web.jar</literal></title>
|
||||
|
|
|
@ -109,12 +109,12 @@
|
|||
</programlisting> This provides a hook into the Spring Security web
|
||||
infrastructure. <classname>DelegatingFilterProxy</classname> is a Spring Framework class
|
||||
which delegates to a filter implementation which is defined as a Spring bean in your
|
||||
application context. In this case, the bean is named "springSecurityFilterChain", which is
|
||||
an internal infrastructure bean created by the namespace to handle web security. Note that
|
||||
you should not use this bean name yourself. Once you've added this to your
|
||||
<filename>web.xml</filename>, you're ready to start editing your application context file.
|
||||
Web security services are configured using the <literal><http></literal> element.
|
||||
</para>
|
||||
application context. In this case, the bean is named
|
||||
<quote>springSecurityFilterChain</quote>, which is an internal infrastructure bean created
|
||||
by the namespace to handle web security. Note that you should not use this bean name
|
||||
yourself. Once you've added this to your <filename>web.xml</filename>, you're ready to start
|
||||
editing your application context file. Web security services are configured using the
|
||||
<literal><http></literal> element. </para>
|
||||
</section>
|
||||
<section xml:id="ns-minimal">
|
||||
<title>A Minimal <literal><http></literal> Configuration</title>
|
||||
|
@ -359,11 +359,11 @@
|
|||
<intercept-url pattern="/**" access="ROLE_USER" requires-channel="any"/>
|
||||
...
|
||||
</http>]]>
|
||||
</programlisting> With this configuration in place, if a user attempts to
|
||||
access anything matching the "/secure/**" pattern using HTTP, they will first be redirected
|
||||
to an HTTPS URL. The available options are "http", "https" or "any". Using the value "any"
|
||||
means that either HTTP or HTTPS can be used. </para>
|
||||
<para> If your application uses non-standard ports for HTTP and/or HTTPS, you can specify a
|
||||
</programlisting>With this configuration in place, if a user attempts to access
|
||||
anything matching the "/secure/**" pattern using HTTP, they will first be redirected to an
|
||||
HTTPS URL. The available options are "http", "https" or "any". Using the value "any" means
|
||||
that either HTTP or HTTPS can be used. </para>
|
||||
<para>If your application uses non-standard ports for HTTP and/or HTTPS, you can specify a
|
||||
list of port mappings as follows: <programlisting><![CDATA[
|
||||
<http>
|
||||
...
|
||||
|
@ -371,10 +371,8 @@
|
|||
<port-mapping http="9080" https="9443"/>
|
||||
</port-mappings>
|
||||
</http>]]>
|
||||
</programlisting>
|
||||
<!--You can find a more in-depth discussion of channel security
|
||||
in <xref xlink:href="#channel-security"/-->
|
||||
</para>
|
||||
</programlisting><!--You can find a more in-depth discussion of channel security
|
||||
in <xref xlink:href="#channel-security"/--></para>
|
||||
</section>
|
||||
<section xml:id="ns-session-mgmt">
|
||||
<title>Session Management</title>
|
||||
|
@ -416,7 +414,7 @@
|
|||
<concurrency-control max-sessions="1" error-if-maximum-exceeded="true" />
|
||||
</session-management>
|
||||
</http>]]>
|
||||
</programlisting> The second login will then be rejected. By
|
||||
</programlisting>The second login will then be rejected. By
|
||||
<quote>rejected</quote>, we mean that the user will be sent to the
|
||||
<literal>authentication-failure-url</literal> if form-based login is being used. If the
|
||||
second authentication takes place through another non-interactive mechanism, such as
|
||||
|
@ -424,10 +422,30 @@
|
|||
the client. If instead you want to use an error page, you can add the attribute
|
||||
<literal>session-authentication-error-url</literal> to the
|
||||
<literal>session-management</literal> element. </para>
|
||||
<para> If you are using a customized authentication filter for form-based login, then you
|
||||
<para>If you are using a customized authentication filter for form-based login, then you
|
||||
have to configure concurrent session control support explicitly. More details can be found
|
||||
in the <link xlink:href="#session-mgmt">Session Management chapter</link>. </para>
|
||||
</section>
|
||||
<section xml:id="ns-session-fixation">
|
||||
<title>Session Fixation Attack Protection</title>
|
||||
<para>
|
||||
<link xlink:href="http://en.wikipedia.org/wiki/Session_fixation">Session fixation</link>
|
||||
attacks are a potential risk where it is possible for a malicious attacker to create a
|
||||
session by accessing a site, then persuade another user to log in with the same session
|
||||
(by sending them a link containing the session identifier as a parameter, for example).
|
||||
Spring Security protects against this automatically by creating a new session when a user
|
||||
logs in. If you don't require this protection, or it conflicts with some other
|
||||
requirement, you can control the behaviour using the
|
||||
<literal>session-fixation-protection</literal> attribute on
|
||||
<literal><session-management></literal>, which has three options
|
||||
<itemizedlist><listitem><para><literal>migrateSession</literal> - creates a new
|
||||
session and copies the existing session attributes to the new session. This is the
|
||||
default.</para></listitem><listitem><para><literal>none</literal> - Don't do
|
||||
anything. The original session will be
|
||||
retained.</para></listitem><listitem><para><literal>newSession</literal> - Create
|
||||
a new "clean" session, without copying the existing session
|
||||
data.</para></listitem></itemizedlist></para>
|
||||
</section>
|
||||
</section>
|
||||
<section xml:id="ns-openid">
|
||||
<title>OpenID Login</title>
|
||||
|
@ -541,25 +559,6 @@
|
|||
overview</link> chapter. </para>
|
||||
</section>
|
||||
</section>
|
||||
<section xml:id="ns-session-fixation">
|
||||
<title>Session Fixation Attack Protection</title>
|
||||
<para>
|
||||
<link xlink:href="http://en.wikipedia.org/wiki/Session_fixation">Session fixation</link>
|
||||
attacks are a potential risk where it is possible for a malicious attacker to create a
|
||||
session by accessing a site, then persuade another user to log in with the same session (by
|
||||
sending them a link containing the session identifier as a parameter, for example). Spring
|
||||
Security protects against this automatically by creating a new session when a user logs in.
|
||||
If you don't require this protection, or it conflicts with some other requirement, you can
|
||||
control the behaviour using the <literal>session-fixation-protection</literal> attribute on
|
||||
<literal><http></literal>, which has three options
|
||||
<itemizedlist><listitem><para><literal>migrateSession</literal> - creates a new
|
||||
session and copies the existing session attributes to the new session. This is the
|
||||
default.</para></listitem><listitem><para><literal>none</literal> - Don't do anything.
|
||||
The original session will be
|
||||
retained.</para></listitem><listitem><para><literal>newSession</literal> - Create a
|
||||
new "clean" session, without copying the existing session
|
||||
data.</para></listitem></itemizedlist></para>
|
||||
</section>
|
||||
</section>
|
||||
<section xml:id="ns-method-security">
|
||||
<title>Method Security</title>
|
||||
|
@ -637,13 +636,13 @@
|
|||
alternative for both method and web security. </para>
|
||||
<para> For method security, you do this by setting the
|
||||
<literal>access-decision-manager-ref</literal> attribute on
|
||||
<literal>global-method-security</literal>to the Id of the appropriate
|
||||
<literal>global-method-security</literal> to the Id of the appropriate
|
||||
<interfacename>AccessDecisionManager</interfacename> bean in the application context: <programlisting language="xml"><![CDATA[
|
||||
<global-method-security access-decision-manager-ref="myAccessDecisionManagerBean">
|
||||
...
|
||||
</global-method-security>
|
||||
]]></programlisting></para>
|
||||
<para> The syntax for web security is the same, but on the <literal>http</literal> element: <programlisting><![CDATA[
|
||||
<para> The syntax for web security is the same, but on the <literal>http</literal> element: <programlisting language="xml"><![CDATA[
|
||||
<http access-decision-manager-ref="myAccessDecisionManagerBean">
|
||||
...
|
||||
</http>
|
||||
|
|
Loading…
Reference in New Issue