diff --git a/config/src/main/resources/org/springframework/security/config/spring-security-3.0.rnc b/config/src/main/resources/org/springframework/security/config/spring-security-3.0.rnc index abbc14e401..620ca61e1d 100644 --- a/config/src/main/resources/org/springframework/security/config/spring-security-3.0.rnc +++ b/config/src/main/resources/org/springframework/security/config/spring-security-3.0.rnc @@ -228,7 +228,7 @@ expression-handler = element expression-handler {ref} custom-after-invocation-provider = - ## Used to decorate an AfterInvocationProvider to specify that it should be used with method security. + ## No longer supported. Use after-invocation-provider instead. element custom-after-invocation-provider {empty} protect-pointcut = diff --git a/docs/manual/src/docbook/appendix-namespace.xml b/docs/manual/src/docbook/appendix-namespace.xml index fac62e1fe9..2a0ffa333c 100644 --- a/docs/manual/src/docbook/appendix-namespace.xml +++ b/docs/manual/src/docbook/appendix-namespace.xml @@ -161,9 +161,9 @@ there is no preference. If this attribute is present on any <intercept-url> element, then a ChannelProcessingFilter will be added to the filter stack and its - additional dependencies added to the application context. See the chapter on channel security for an example - configuration using traditional beans. + configuration using traditional beans. --> If a <port-mappings> configuration is added, this will be used to by the SecureChannelProcessor and InsecureChannelProcessor beans to determine the ports used for @@ -423,7 +423,7 @@
The <authentication-provider> Element This element is basically a shorthand syntax for configuring a DaoAuthenticationProvider. + xlink:href="#core-services-dao-provider">DaoAuthenticationProvider. DaoAuthenticationProvider loads user information from a UserDetailsService and compares the username/password combination with the values supplied at login. The diff --git a/docs/manual/src/docbook/core-services.xml b/docs/manual/src/docbook/core-services.xml index c9e0c4eb1b..0f9d771e86 100644 --- a/docs/manual/src/docbook/core-services.xml +++ b/docs/manual/src/docbook/core-services.xml @@ -8,7 +8,7 @@ AccessDecisionManager. These crop up regularly throughout the remainder of this document so it's important you know how they are configured and how they operate. -
+
The <interfacename>AuthenticationManager</interfacename>, <classname>ProviderManager</classname> and <classname>AuthenticationProvider</classname>s @@ -74,7 +74,7 @@ concerned about this, because if you forget to register a suitable provider, you'll simply receive a ProviderNotFoundException when an attempt to authenticate is made. -
+
<literal>DaoAuthenticationProvider</literal> The simplest AuthenticationProvider implemented by Spring Security is DaoAuthenticationProvider, which is is also @@ -128,7 +128,7 @@ should be easy for users to retrieve authentication information using a persistence strategy of their choice. Having said that, Spring Security does include a couple of useful base implementations, which we'll look at below. -
+
In-Memory Authentication Is easy to use create a custom UserDetailsService implementation that extracts information from a persistence engine of choice, but @@ -137,7 +137,7 @@ Security, when you don't really want to spend time configuring databases or writing UserDetailsService implementations. For this sort of situation, a simple option is to use the user-service element - from the security namespace: namespace: @@ -153,7 +153,7 @@ jimi=jimispassword,ROLE_USER,ROLE_ADMIN,enabled bob=bobspassword,ROLE_USER,enabled
-
+
<literal>JdbcDaoImpl</literal> Spring Security also includes a UserDetailsService that can obtain authentication information from a JDBC data source. Internally diff --git a/docs/manual/src/docbook/namespace-config.xml b/docs/manual/src/docbook/namespace-config.xml index 31a4491e94..d16f7b0265 100644 --- a/docs/manual/src/docbook/namespace-config.xml +++ b/docs/manual/src/docbook/namespace-config.xml @@ -177,7 +177,7 @@ application (which will be used for access control). It is also possible to load user information from a standard properties file using the properties attribute on user-service. See the section on in-memory authentication for more details. Using + xlink:href="#core-services-in-memory-service">in-memory authentication for more details. Using the <authentication-provider> element means that the user information will be used by the authentication manager to process authentication requests. At this point you should be able to start up your application and you will be required @@ -366,8 +366,8 @@ ]]> - You can find a more in-depth discussion of channel security - in . +
Concurrent Session Control @@ -569,7 +569,7 @@ element. The CAS sample application is a good example of the use of custom beans with the namespace, including this syntax. If you aren't familiar with authentication entry points, - they are discussed in the technical + they are discussed in the technical overview chapter.
diff --git a/docs/manual/src/docbook/preauth.xml b/docs/manual/src/docbook/preauth.xml index cac1c2c590..ac3b4cbb25 100644 --- a/docs/manual/src/docbook/preauth.xml +++ b/docs/manual/src/docbook/preauth.xml @@ -111,7 +111,7 @@
Http403ForbiddenEntryPoint - The AuthenticationEntryPoint was discussed in the technical + The AuthenticationEntryPoint was discussed in the technical overview chapter. Normally it is responsible for kick-starting the authentication process for an unauthenticated user (when they try to access a protected resource), but in the pre-authenticated case this doesn't apply. You would only configure the ExceptionTranslationFilter with an instance of this class if you aren't diff --git a/docs/manual/src/docbook/samples.xml b/docs/manual/src/docbook/samples.xml index 1e6a46e18e..23f1fd744e 100644 --- a/docs/manual/src/docbook/samples.xml +++ b/docs/manual/src/docbook/samples.xml @@ -19,7 +19,7 @@ namespace configuration throughout. The compiled application is included in the distribution zip file, ready to be deployed into your web container (spring-security-samples-tutorial-3.0.x.war). The form-based authentication mechanism is used in combination + xlink:href="#ns-form-and-basic">form-based authentication mechanism is used in combination with the commonly-used remember-me authentication provider to automatically remember the login using cookies. We recommend you start with the tutorial sample, as the XML is minimal and easy to @@ -117,6 +117,6 @@ Success! Your web filters appear to be properly configured! xlink:href="#preauth">pre-authentication framework to make use of login information from a J2EE container. The user name and roles are those setup by the container. - The code is in samples/preauth . + The code is in samples/preauth.
diff --git a/docs/manual/src/docbook/security-filter-chain.xml b/docs/manual/src/docbook/security-filter-chain.xml index cc5e28e3bd..0fcb7cad47 100644 --- a/docs/manual/src/docbook/security-filter-chain.xml +++ b/docs/manual/src/docbook/security-filter-chain.xml @@ -110,7 +110,7 @@ false and servlet container lifecycle invocations are not delegated through DelegatingFilterProxy. When we looked at how to set up web security using namespace configuration, we used a + xlink:href="#ns-web-xml">namespace configuration, we used a DelegatingFilterProxy with the name springSecurityFilterChain. You should now be able to see that this is the name of the FilterChainProxy which is created by the namespace. diff --git a/docs/manual/src/docbook/springsecurity.xml b/docs/manual/src/docbook/springsecurity.xml index 0282d24322..f96a85f517 100644 --- a/docs/manual/src/docbook/springsecurity.xml +++ b/docs/manual/src/docbook/springsecurity.xml @@ -10,7 +10,7 @@ Spring Security - 3.0.0.M1 + 3.0.0.M2 diff --git a/docs/manual/src/docbook/technical-overview.xml b/docs/manual/src/docbook/technical-overview.xml index 2ac5f97fcc..f73ae8dd74 100644 --- a/docs/manual/src/docbook/technical-overview.xml +++ b/docs/manual/src/docbook/technical-overview.xml @@ -111,7 +111,7 @@ if (principal instanceof UserDetails) { On successful authentication, UserDetails is used to build the Authentication object that is stored in the SecurityContextHolder (more on this below). The good news is that we + xlink:href="#tech-intro-authentication">below). The good news is that we provide a number of UserDetailsService implementations, including one that uses an in-memory map (InMemoryDaoImpl) and another that uses JDBC (JdbcDaoImpl). Most users tend to @@ -322,7 +322,7 @@ Successfully authenticated. Security context contains: \ work, and still provide authorization capabilities. All you need to do is write a filter (or equivalent) that reads the third-party user information from a location, build a Spring Security-specific Authentication object, and put it - onto the SecurityContextHolder. + into the SecurityContextHolder. If you're wondering how the AuthenticationManager manager is implemented in a real world example, we'll look at that in