diff --git a/config/src/main/resources/org/springframework/security/config/spring-security-3.0.rnc b/config/src/main/resources/org/springframework/security/config/spring-security-3.0.rnc
index abbc14e401..620ca61e1d 100644
--- a/config/src/main/resources/org/springframework/security/config/spring-security-3.0.rnc
+++ b/config/src/main/resources/org/springframework/security/config/spring-security-3.0.rnc
@@ -228,7 +228,7 @@ expression-handler =
element expression-handler {ref}
custom-after-invocation-provider =
- ## Used to decorate an AfterInvocationProvider to specify that it should be used with method security.
+ ## No longer supported. Use after-invocation-provider instead.
element custom-after-invocation-provider {empty}
protect-pointcut =
diff --git a/docs/manual/src/docbook/appendix-namespace.xml b/docs/manual/src/docbook/appendix-namespace.xml
index fac62e1fe9..2a0ffa333c 100644
--- a/docs/manual/src/docbook/appendix-namespace.xml
+++ b/docs/manual/src/docbook/appendix-namespace.xml
@@ -161,9 +161,9 @@
there is no preference. If this attribute is present on any
<intercept-url> element, then a
ChannelProcessingFilter will be added to the filter stack and its
- additional dependencies added to the application context. See the chapter on channel security for an example
- configuration using traditional beans.
+ configuration using traditional beans. -->
If a <port-mappings> configuration is added, this will be
used to by the SecureChannelProcessor and
InsecureChannelProcessor beans to determine the ports used for
@@ -423,7 +423,7 @@
The <authentication-provider> Element This element is basically a shorthand syntax for configuring a DaoAuthenticationProvider.
+ xlink:href="#core-services-dao-provider">DaoAuthenticationProvider.
DaoAuthenticationProvider loads user information from a
UserDetailsService and compares the username/password
combination with the values supplied at login. The
diff --git a/docs/manual/src/docbook/core-services.xml b/docs/manual/src/docbook/core-services.xml
index c9e0c4eb1b..0f9d771e86 100644
--- a/docs/manual/src/docbook/core-services.xml
+++ b/docs/manual/src/docbook/core-services.xml
@@ -8,7 +8,7 @@
AccessDecisionManager. These crop up regularly throughout
the remainder of this document so it's important you know how they are configured and how
they operate.
-
+ The AuthenticationManager,
ProviderManager and
AuthenticationProviders
@@ -74,7 +74,7 @@
concerned about this, because if you forget to register a suitable provider, you'll
simply receive a ProviderNotFoundException when an attempt to
authenticate is made.
-
+ DaoAuthenticationProviderThe simplest AuthenticationProvider implemented by
Spring Security is DaoAuthenticationProvider, which is is also
@@ -128,7 +128,7 @@
should be easy for users to retrieve authentication information using a persistence
strategy of their choice. Having said that, Spring Security does include a couple of
useful base implementations, which we'll look at below.
-
+ In-Memory AuthenticationIs easy to use create a custom UserDetailsService
implementation that extracts information from a persistence engine of choice, but
@@ -137,7 +137,7 @@
Security, when you don't really want to spend time configuring databases or writing
UserDetailsService implementations. For this sort
of situation, a simple option is to use the user-service element
- from the security namespace: namespace:
@@ -153,7 +153,7 @@
jimi=jimispassword,ROLE_USER,ROLE_ADMIN,enabled
bob=bobspassword,ROLE_USER,enabled
-
+ JdbcDaoImplSpring Security also includes a UserDetailsService
that can obtain authentication information from a JDBC data source. Internally
diff --git a/docs/manual/src/docbook/namespace-config.xml b/docs/manual/src/docbook/namespace-config.xml
index 31a4491e94..d16f7b0265 100644
--- a/docs/manual/src/docbook/namespace-config.xml
+++ b/docs/manual/src/docbook/namespace-config.xml
@@ -177,7 +177,7 @@
application (which will be used for access control). It is also possible to load user
information from a standard properties file using the properties
attribute on user-service. See the section on in-memory authentication for more details. Using
+ xlink:href="#core-services-in-memory-service">in-memory authentication for more details. Using
the <authentication-provider> element means that the user
information will be used by the authentication manager to process authentication requests. At this point you should be able to start up your application and you will be required
@@ -366,8 +366,8 @@
]]>
- You can find a more in-depth discussion of channel security
- in .
+
Concurrent Session Control
@@ -569,7 +569,7 @@
element.
The CAS sample application is a good example of the use of custom beans with the
namespace, including this syntax. If you aren't familiar with authentication entry points,
- they are discussed in the technical
+ they are discussed in the technical
overview chapter.
diff --git a/docs/manual/src/docbook/preauth.xml b/docs/manual/src/docbook/preauth.xml
index cac1c2c590..ac3b4cbb25 100644
--- a/docs/manual/src/docbook/preauth.xml
+++ b/docs/manual/src/docbook/preauth.xml
@@ -111,7 +111,7 @@
Http403ForbiddenEntryPoint
- The AuthenticationEntryPoint was discussed in the technical
+ The AuthenticationEntryPoint was discussed in the technical
overview chapter. Normally it is responsible for kick-starting the authentication process for an unauthenticated user
(when they try to access a protected resource), but in the pre-authenticated case this doesn't apply. You would only
configure the ExceptionTranslationFilter with an instance of this class if you aren't
diff --git a/docs/manual/src/docbook/samples.xml b/docs/manual/src/docbook/samples.xml
index 1e6a46e18e..23f1fd744e 100644
--- a/docs/manual/src/docbook/samples.xml
+++ b/docs/manual/src/docbook/samples.xml
@@ -19,7 +19,7 @@
namespace configuration throughout. The compiled application is included in the
distribution zip file, ready to be deployed into your web container
(spring-security-samples-tutorial-3.0.x.war). The form-based authentication mechanism is used in combination
+ xlink:href="#ns-form-and-basic">form-based authentication mechanism is used in combination
with the commonly-used remember-me authentication
provider to automatically remember the login using cookies.We recommend you start with the tutorial sample, as the XML is minimal and easy to
@@ -117,6 +117,6 @@ Success! Your web filters appear to be properly configured!
xlink:href="#preauth">pre-authentication framework to make use of login
information from a J2EE container. The user name and roles are those setup by the
container.
- The code is in samples/preauth .
+ The code is in samples/preauth.
diff --git a/docs/manual/src/docbook/security-filter-chain.xml b/docs/manual/src/docbook/security-filter-chain.xml
index cc5e28e3bd..0fcb7cad47 100644
--- a/docs/manual/src/docbook/security-filter-chain.xml
+++ b/docs/manual/src/docbook/security-filter-chain.xml
@@ -110,7 +110,7 @@
false and servlet container lifecycle invocations are not delegated
through DelegatingFilterProxy.
When we looked at how to set up web security using namespace configuration, we used a
+ xlink:href="#ns-web-xml">namespace configuration, we used a
DelegatingFilterProxy with the name
springSecurityFilterChain. You should now be able to see that this is the
name of the FilterChainProxy which is created by the namespace.
diff --git a/docs/manual/src/docbook/springsecurity.xml b/docs/manual/src/docbook/springsecurity.xml
index 0282d24322..f96a85f517 100644
--- a/docs/manual/src/docbook/springsecurity.xml
+++ b/docs/manual/src/docbook/springsecurity.xml
@@ -10,7 +10,7 @@
Spring Security
- 3.0.0.M1
+ 3.0.0.M2
diff --git a/docs/manual/src/docbook/technical-overview.xml b/docs/manual/src/docbook/technical-overview.xml
index 2ac5f97fcc..f73ae8dd74 100644
--- a/docs/manual/src/docbook/technical-overview.xml
+++ b/docs/manual/src/docbook/technical-overview.xml
@@ -111,7 +111,7 @@ if (principal instanceof UserDetails) {
On successful authentication, UserDetails is used to
build the Authentication object that is stored in the
SecurityContextHolder (more on this below). The good news is that we
+ xlink:href="#tech-intro-authentication">below). The good news is that we
provide a number of UserDetailsService implementations,
including one that uses an in-memory map (InMemoryDaoImpl) and
another that uses JDBC (JdbcDaoImpl). Most users tend to
@@ -322,7 +322,7 @@ Successfully authenticated. Security context contains: \
work, and still provide authorization capabilities. All you need to do is write a filter
(or equivalent) that reads the third-party user information from a location, build a
Spring Security-specific Authentication object, and put it
- onto the SecurityContextHolder.
+ into the SecurityContextHolder.
If you're wondering how the AuthenticationManager
manager is implemented in a real world example, we'll look at that in