Release numbering section.

This commit is contained in:
Ben Alex 2006-02-09 07:44:48 +00:00
parent 48f5d7f289
commit 32893f49cf

View File

@ -95,27 +95,23 @@
although equivalent functionality is fully accommodated by Acegi although equivalent functionality is fully accommodated by Acegi
Security.</para> Security.</para>
<sect2 id="security-introduction-status"> <sect2 id="security-introduction-release-numbering">
<title>Current Status</title> <title>Release Numbering</title>
<para>The Acegi Security System for Spring is widely used by members <para>It is useful to understand how the Acegi Security release
of the Spring Community. The APIs are considered stable and only minor numbers work, as it will help you identify the effort (or lack
changes are expected. Having said that, like many other projects we thereof) involved in migrating to future releases of the project.
need to strike a balance between backward compatibility and Officially, we use the Apache Portable Runtime Project versioning
improvement. Effective version 0.6.1, Acegi Security uses the Apache guidelines, which can be viewed at
Portable Runtime Project versioning guidelines, available from <literal>http://apr.apache.org/versioning.html</literal>. We quote the
<literal>http://apr.apache.org/versioning.html</literal>.</para> introduction contained on that page for your convenience:</para>
<para>We are now at release 0.9.0, and a lot of effort has been made <para><quote>Versions are denoted using a standard triplet of
to implement all non-backward compatible changes either in or before integers: MAJOR.MINOR.PATCH. The basic intent is that MAJOR versions
this release. Some minor improvements are currently intended to the are incompatible, large-scale upgrades of the API. MINOR versions
1.0.0 release, although they will in no way modify the project's retain source and binary compatibility with older minor versions, and
central interfaces or classes. Users of Acegi Security System for changes in the PATCH level are perfectly compatible, forwards and
Spring should therefore be comfortable depending on the current backwards.</quote></para>
version of the project in their applications. Please note that we will
be changing the package name prefix in the 1.0.0 release, but this
should be a simple "find and replace" type operation in your
code.</para>
</sect2> </sect2>
</sect1> </sect1>
@ -4070,8 +4066,6 @@ $CATALINA_HOME/bin/startup.sh</programlisting></para>
process, is only invoked if the certificate is rejected and it always process, is only invoked if the certificate is rejected and it always
returns an error to the user. With a suitable bean configuration, the returns an error to the user. With a suitable bean configuration, the
normal sequence of events is as follows <orderedlist> normal sequence of events is as follows <orderedlist>
<listitem> <listitem>
<para>The <classname>X509ProcessingFilter</classname> extracts <para>The <classname>X509ProcessingFilter</classname> extracts
the certificate from the request and uses it as the credentials the certificate from the request and uses it as the credentials
@ -4080,8 +4074,6 @@ $CATALINA_HOME/bin/startup.sh</programlisting></para>
The request is passed to the authentication manager.</para> The request is passed to the authentication manager.</para>
</listitem> </listitem>
<listitem> <listitem>
<para>The <classname>X509AuthenticationProvider</classname> <para>The <classname>X509AuthenticationProvider</classname>
receives the token. Its main concern is to obtain the user receives the token. Its main concern is to obtain the user
@ -4109,8 +4101,6 @@ $CATALINA_HOME/bin/startup.sh</programlisting></para>
load the user information.<!-- TODO: Give email matching as an example --></para> load the user information.<!-- TODO: Give email matching as an example --></para>
</listitem> </listitem>
<listitem> <listitem>
<para>If everything has gone smoothly then there should be a <para>If everything has gone smoothly then there should be a
valid <classname>Authentication</classname> object in the secure valid <classname>Authentication</classname> object in the secure
@ -4120,7 +4110,6 @@ $CATALINA_HOME/bin/startup.sh</programlisting></para>
<classname>X509ProcessingFilterEntryPoint</classname> which <classname>X509ProcessingFilterEntryPoint</classname> which
returns a 403 error (forbidden) to the user.</para> returns a 403 error (forbidden) to the user.</para>
</listitem> </listitem>
</orderedlist></para> </orderedlist></para>
</sect2> </sect2>
@ -4176,218 +4165,252 @@ $CATALINA_HOME/bin/startup.sh</programlisting></para>
<sect2 id="security-ldap-overview"> <sect2 id="security-ldap-overview">
<title>Overview</title> <title>Overview</title>
<para>LDAP is often used by organizations as a central repository for user information and
as an authentication service. It can also be used to store the role information for <para>LDAP is often used by organizations as a central repository for
application users. </para> user information and as an authentication service. It can also be used
<para>There are many different scenarios for how an LDAP server may be configured so the to store the role information for application users.</para>
Acegi LDAP provider is fully configurable. It uses separate strategy interfaces for
authentication and role retrieval and provides default implementations which can be <para>There are many different scenarios for how an LDAP server may be
configured to handle a wide range of situations. </para> configured so the Acegi LDAP provider is fully configurable. It uses
<para>You should be familiar with LDAP before trying to use it with Acegi. The following separate strategy interfaces for authentication and role retrieval and
link provides a good introduction to the concepts involved and a guide to setting up a provides default implementations which can be configured to handle a
directory using the free LDAP server OpenLDAP: <ulink wide range of situations.</para>
url="http://www.zytrax.com/books/ldap/"/>. Some familiarity with the JNDI APIs used to
access LDAP from Java may also be useful. We don't use any third-party LDAP libraries <para>You should be familiar with LDAP before trying to use it with
(Mozilla/Netscape, JLDAP etc.) in the LDAP provider. </para> Acegi. The following link provides a good introduction to the concepts
involved and a guide to setting up a directory using the free LDAP
server OpenLDAP: <ulink
url="http://www.zytrax.com/books/ldap/"></ulink>. Some familiarity
with the JNDI APIs used to access LDAP from Java may also be useful.
We don't use any third-party LDAP libraries (Mozilla/Netscape, JLDAP
etc.) in the LDAP provider.</para>
<sect3 id="security-ldap-details"> <sect3 id="security-ldap-details">
<title>LDAP with Acegi Security</title> <title>LDAP with Acegi Security</title>
<para>The main LDAP provider class is <para>The main LDAP provider class is
<classname>org.acegisecurity.providers.ldap.LdapAuthenticationProvider</classname>. This <classname>org.acegisecurity.providers.ldap.LdapAuthenticationProvider</classname>.
bean doesn't actually do much itself other than implement the This bean doesn't actually do much itself other than implement the
<methodname>retrieveUser</methodname> method required by its base class, <methodname>retrieveUser</methodname> method required by its base
<classname>AbstractUserDetailsAuthenticationProvider</classname>. It delegates the work class,
to two other beans, an <interfacename>LdapAuthenticator</interfacename> and an <classname>AbstractUserDetailsAuthenticationProvider</classname>. It
<interfacename>LdapAuthoritiesPopulator</interfacename> which are responsible for delegates the work to two other beans, an
authenticating the user and retrieving the user's set of <interfacename>LdapAuthenticator</interfacename> and an
<interfacename>GrantedAuthority</interfacename>s respectively. <interfacename>LdapAuthoritiesPopulator</interfacename> which are
</para> responsible for authenticating the user and retrieving the user's
set of <interfacename>GrantedAuthority</interfacename>s
respectively.</para>
</sect3> </sect3>
</sect2> </sect2>
<sect2 id="security-ldap-authenticators"> <sect2 id="security-ldap-authenticators">
<title>LdapAuthenticator Implementations</title> <title>LdapAuthenticator Implementations</title>
<para> The authenticator is also responsible for retrieving any required user attributes.
This is because the permissions on the attributes may depend on the type of <para>The authenticator is also responsible for retrieving any
authentication being used. For example, if binding as the user, it may be necessary to required user attributes. This is because the permissions on the
read them with the user's own permissions. </para> attributes may depend on the type of authentication being used. For
<para> There are currently two authentication strategies supplied with Acegi Security: example, if binding as the user, it may be necessary to read them with
<itemizedlist> the user's own permissions.</para>
<listitem>
<para>Authentication directly to the LDAP server ("bind" authentication).</para> <para>There are currently two authentication strategies supplied with
</listitem> Acegi Security: <itemizedlist>
<listitem> <listitem>
<para>Password comparison, where the password supplied by the user is compared with <para>Authentication directly to the LDAP server ("bind"
the one stored in the repository. This can either be done by retrieving the value authentication).</para>
of the password attribute and checking it locally or by performing an LDAP </listitem>
"compare" operation, where the supplied password is passed to the server for
comparison and the real password value is never retrieved.</para> <listitem>
</listitem> <para>Password comparison, where the password supplied by the
</itemizedlist> user is compared with the one stored in the repository. This can
</para> either be done by retrieving the value of the password attribute
<sect3> and checking it locally or by performing an LDAP "compare"
<title>Common Functionality</title> operation, where the supplied password is passed to the server
<para>Before it is possible to authenticate a user (by either strategy), the for comparison and the real password value is never
distinguished name (DN) has to be obtained from the login name supplied to the retrieved.</para>
application. This can be done either by simple pattern-matching (by setting the </listitem>
<property>setUserDnPatterns</property> array property) or by setting the </itemizedlist></para>
<property>userSearch</property> property. For the DN pattern-matching approach, a
standard Java pattern format is used, and the login name will be substituted for the <sect3>
parameter <parameter>{0}</parameter>. The pattern should be relative to the DN that <title>Common Functionality</title>
the configured <interfacename>InitialDirContextFactory</interfacename> will bind to
(see the section on <link linkend="security-ldap-dircontextfactory">connecting to the <para>Before it is possible to authenticate a user (by either
LDAP server</link> for more information on this). For example, if you are using an strategy), the distinguished name (DN) has to be obtained from the
LDAP server specified by the URL login name supplied to the application. This can be done either by
<literal>ldap://monkeymachine.co.uk/dc=acegisecurity,dc=org</literal>, and have a simple pattern-matching (by setting the
pattern <literal>uid={0},ou=greatapes</literal>, then a login name of "gorilla" will <property>setUserDnPatterns</property> array property) or by setting
map to a DN <literal>uid=gorilla,ou=greatapes,dc=acegisecurity,dc=org</literal>. Each the <property>userSearch</property> property. For the DN
configured DN pattern will be tried in turn until a match is found. For information on pattern-matching approach, a standard Java pattern format is used,
using a search, see the section on <link linkend="security-ldap-searchobjects">search and the login name will be substituted for the parameter
objects</link> below. A combination of the two approaches can also be used - the <parameter>{0}</parameter>. The pattern should be relative to the DN
patterns will be checked first and if no matching DN is found, the search will be that the configured
used. </para> <interfacename>InitialDirContextFactory</interfacename> will bind to
</sect3> (see the section on <link
<sect3> linkend="security-ldap-dircontextfactory">connecting to the LDAP
<title>BindAuthenticator</title> server</link> for more information on this). For example, if you are
<para>The class using an LDAP server specified by the URL
<classname>org.acegisecurity.providers.ldap.authenticator.BindAuthenticator</classname> <literal>ldap://monkeymachine.co.uk/dc=acegisecurity,dc=org</literal>,
implements the bind authentication strategy. It simply attempts to bind as the user. and have a pattern <literal>uid={0},ou=greatapes</literal>, then a
</para> login name of "gorilla" will map to a DN
</sect3> <literal>uid=gorilla,ou=greatapes,dc=acegisecurity,dc=org</literal>.
<sect3> Each configured DN pattern will be tried in turn until a match is
<title>PasswordComparisonAuthenticator</title> found. For information on using a search, see the section on <link
<para>The class linkend="security-ldap-searchobjects">search objects</link> below. A
<classname>org.acegisecurity.providers.ldap.authenticator.PasswordComparisonAuthenticator</classname> combination of the two approaches can also be used - the patterns
implements the password comparison authentication strategy.</para> will be checked first and if no matching DN is found, the search
</sect3> will be used.</para>
<sect3 id="security-ldap-authenticators-adauth"> </sect3>
<title>Active Directory Authentication</title>
<para>In addition to standard LDAP authentication (binding with a DN), Active Directory <sect3>
has its own non-standard syntax for user authentication. <title>BindAuthenticator</title>
</para>
</sect3> <para>The class
<classname>org.acegisecurity.providers.ldap.authenticator.BindAuthenticator</classname>
implements the bind authentication strategy. It simply attempts to
bind as the user.</para>
</sect3>
<sect3>
<title>PasswordComparisonAuthenticator</title>
<para>The class
<classname>org.acegisecurity.providers.ldap.authenticator.PasswordComparisonAuthenticator</classname>
implements the password comparison authentication strategy.</para>
</sect3>
<sect3 id="security-ldap-authenticators-adauth">
<title>Active Directory Authentication</title>
<para>In addition to standard LDAP authentication (binding with a
DN), Active Directory has its own non-standard syntax for user
authentication.</para>
</sect3>
</sect2> </sect2>
<sect2 id="security-ldap-dircontextfactory"> <sect2 id="security-ldap-dircontextfactory">
<title>Connecting to the LDAP Server</title> <title>Connecting to the LDAP Server</title>
<para>The beans discussed above have to be able to connect to the server. They both have
to be supplied with an <interfacename>InitialDirContextFactory</interfacename> instance. <para>The beans discussed above have to be able to connect to the
Unless you have special requirements, this will usually be a server. They both have to be supplied with an
<classname>DefaultInitialDirContextFactory</classname> bean, which can be configured <interfacename>InitialDirContextFactory</interfacename> instance.
with the URL of your LDAP server and optionally with the username and password of a Unless you have special requirements, this will usually be a
"manager" user which will be used by default when binding to the server (instead of <classname>DefaultInitialDirContextFactory</classname> bean, which can
binding anonymously). It currently supports "simple" LDAP authentication.</para> be configured with the URL of your LDAP server and optionally with the
<para><classname>DefaultInitialDirContextFactory</classname> uses Sun's JNDI LDAP username and password of a "manager" user which will be used by
implementation by default (the one that comes with the JDK). It also supports the default when binding to the server (instead of binding anonymously).
built in connection pooling offered by Sun's provider. Connections which are obtained It currently supports "simple" LDAP authentication.</para>
either anonymously or with the "manager" user's identity will be pooled automatically.
Connections obtained with a specific user's identity will not be pooled. Connection <para><classname>DefaultInitialDirContextFactory</classname> uses
pooling can be disabled completely by setting the <property>useConnectionPool</property> Sun's JNDI LDAP implementation by default (the one that comes with the
property to false. JDK). It also supports the built in connection pooling offered by
</para> Sun's provider. Connections which are obtained either anonymously or
<para> See the <ulink with the "manager" user's identity will be pooled automatically.
url="http://acegisecurity.org/multiproject/acegi-security/xref/org/acegisecurity/providers/ldap/DefaultInitialDirContextFactory.html" Connections obtained with a specific user's identity will not be
>class Javadoc and source</ulink> for more information on this bean and its properties. pooled. Connection pooling can be disabled completely by setting the
</para> <property>useConnectionPool</property> property to false.</para>
</sect2>
<para>See the <ulink
url="http://acegisecurity.org/multiproject/acegi-security/xref/org/acegisecurity/providers/ldap/DefaultInitialDirContextFactory.html">class
Javadoc and source</ulink> for more information on this bean and its
properties.</para>
</sect2>
<sect2 id="security-ldap-searchobjects"> <sect2 id="security-ldap-searchobjects">
<title>LDAP Search Objects</title> <title>LDAP Search Objects</title>
<para>Often more a more complicated strategy than simple DN-matching is required to locate
a user entry in the directory. This can be encapsulated in an <para>Often more a more complicated strategy than simple DN-matching
<interfacename>LdapUserSearch</interfacename> instance which can be supplied to the is required to locate a user entry in the directory. This can be
authenticator implementations, for example, to allow them to locate a user. The supplied encapsulated in an <interfacename>LdapUserSearch</interfacename>
implementation is <classname>FilterBasedLdapUserSearch</classname>. instance which can be supplied to the authenticator implementations,
</para> for example, to allow them to locate a user. The supplied
implementation is
<classname>FilterBasedLdapUserSearch</classname>.</para>
<sect3> <sect3>
<title><classname>FilterBasedLdapUserSearch</classname></title> <title><classname>FilterBasedLdapUserSearch</classname></title>
<para>This bean uses an LDAP filter to match the user object in the directory. The
process is explained in the Javadoc for the corresponding search method on the <para>This bean uses an LDAP filter to match the user object in the
<ulink directory. The process is explained in the Javadoc for the
url="http://java.sun.com/j2se/1.4.2/docs/api/javax/naming/directory/DirContext.html#search(javax.naming.Name,%20java.lang.String,%20java.lang.Object[],%20javax.naming.directory.SearchControls)">JDK corresponding search method on the <ulink
DirContext class</ulink>. url="http://java.sun.com/j2se/1.4.2/docs/api/javax/naming/directory/DirContext.html#search(javax.naming.Name,%20java.lang.String,%20java.lang.Object[],%20javax.naming.directory.SearchControls)">JDK
As explained there, the search filter can be supplied with parameters. For this class, DirContext class</ulink>. As explained there, the search filter can
the only valid parameter is <parameter>{0}</parameter> which will be replaced with be supplied with parameters. For this class, the only valid
the user's login name. parameter is <parameter>{0}</parameter> which will be replaced with
</para> the user's login name.</para>
</sect3> </sect3>
</sect2> </sect2>
<sect2 id="security-ldap-config"> <sect2 id="security-ldap-config">
<title>Configuring the LDAP Provider</title> <title>Configuring the LDAP Provider</title>
<para>There is a version of the <para>There is a version of the <link
<link linkend="security-sample">Contacts Sample Application</link> which linkend="security-sample">Contacts Sample Application</link> which
uses LDAP. You can copy the beans and filter setup from this as a starting uses LDAP. You can copy the beans and filter setup from this as a
point for configuring your own application. starting point for configuring your own application.</para>
</para>
<para> <para>A typical configuration, using some of the beans we've discussed
A typical configuration, using some of the beans we've discussed above, might look like this: above, might look like this: <programlisting>
<programlisting> &lt;bean id="initialDirContextFactory"
&lt;bean id=&quot;initialDirContextFactory&quot; class="org.acegisecurity.providers.ldap.DefaultInitialDirContextFactory"&gt;
class=&quot;org.acegisecurity.providers.ldap.DefaultInitialDirContextFactory&quot;&gt; &lt;constructor-arg value="ldap://monkeymachine:389/dc=acegisecurity,dc=org"/&gt;
&lt;constructor-arg value=&quot;ldap://monkeymachine:389/dc=acegisecurity,dc=org&quot;/&gt; &lt;property name="managerDn"&gt;&lt;value&gt;cn=manager,dc=acegisecurity,dc=org&lt;/value&gt;&lt;/property&gt;
&lt;property name=&quot;managerDn&quot;&gt;&lt;value&gt;cn=manager,dc=acegisecurity,dc=org&lt;/value&gt;&lt;/property&gt; &lt;property name="managerPassword"&gt;&lt;value&gt;password&lt;/value&gt;&lt;/property&gt;
&lt;property name=&quot;managerPassword&quot;&gt;&lt;value&gt;password&lt;/value&gt;&lt;/property&gt;
&lt;/bean&gt; &lt;/bean&gt;
&lt;bean id=&quot;userSearch&quot; &lt;bean id="userSearch"
class=&quot;org.acegisecurity.providers.ldap.search.FilterBasedLdapUserSearch&quot;&gt; class="org.acegisecurity.providers.ldap.search.FilterBasedLdapUserSearch"&gt;
&lt;constructor-arg index=&quot;0&quot;&gt; &lt;constructor-arg index="0"&gt;
&lt;value&gt;&lt;/value&gt; &lt;value&gt;&lt;/value&gt;
&lt;/constructor-arg&gt; &lt;/constructor-arg&gt;
&lt;constructor-arg index=&quot;1&quot;&gt; &lt;constructor-arg index="1"&gt;
&lt;value&gt;(uid={0})&lt;/value&gt; &lt;value&gt;(uid={0})&lt;/value&gt;
&lt;/constructor-arg&gt; &lt;/constructor-arg&gt;
&lt;constructor-arg index=&quot;2&quot;&gt; &lt;constructor-arg index="2"&gt;
&lt;ref local=&quot;initialDirContextFactory&quot; /&gt; &lt;ref local="initialDirContextFactory" /&gt;
&lt;/constructor-arg&gt; &lt;/constructor-arg&gt;
&lt;property name=&quot;searchSubtree&quot;&gt; &lt;property name="searchSubtree"&gt;
&lt;value&gt;true&lt;/value&gt; &lt;value&gt;true&lt;/value&gt;
&lt;/property&gt; &lt;/property&gt;
&lt;/bean&gt; &lt;/bean&gt;
&lt;bean id=&quot;ldapAuthProvider&quot; &lt;bean id="ldapAuthProvider"
class=&quot;org.acegisecurity.providers.ldap.LdapAuthenticationProvider&quot;&gt; class="org.acegisecurity.providers.ldap.LdapAuthenticationProvider"&gt;
&lt;constructor-arg&gt; &lt;constructor-arg&gt;
&lt;bean class=&quot;org.acegisecurity.providers.ldap.authenticator.BindAuthenticator&quot;&gt; &lt;bean class="org.acegisecurity.providers.ldap.authenticator.BindAuthenticator"&gt;
&lt;constructor-arg&gt;&lt;ref local=&quot;initialDirContextFactory&quot;/&gt;&lt;/constructor-arg&gt; &lt;constructor-arg&gt;&lt;ref local="initialDirContextFactory"/&gt;&lt;/constructor-arg&gt;
&lt;property name=&quot;userDnPatterns&quot;&gt;&lt;list&gt;&lt;value&gt;uid={0},ou=people&lt;/value&gt;&lt;/list&gt;&lt;/property&gt; &lt;property name="userDnPatterns"&gt;&lt;list&gt;&lt;value&gt;uid={0},ou=people&lt;/value&gt;&lt;/list&gt;&lt;/property&gt;
&lt;/bean&gt; &lt;/bean&gt;
&lt;/constructor-arg&gt; &lt;/constructor-arg&gt;
&lt;constructor-arg&gt; &lt;constructor-arg&gt;
&lt;bean class=&quot;org.acegisecurity.providers.ldap.populator.DefaultLdapAuthoritiesPopulator&quot;&gt; &lt;bean class="org.acegisecurity.providers.ldap.populator.DefaultLdapAuthoritiesPopulator"&gt;
&lt;constructor-arg&gt;&lt;ref local=&quot;initialDirContextFactory&quot;/&gt;&lt;/constructor-arg&gt; &lt;constructor-arg&gt;&lt;ref local="initialDirContextFactory"/&gt;&lt;/constructor-arg&gt;
&lt;constructor-arg&gt;&lt;value&gt;ou=groups&lt;/value&gt;&lt;/constructor-arg&gt; &lt;constructor-arg&gt;&lt;value&gt;ou=groups&lt;/value&gt;&lt;/constructor-arg&gt;
&lt;property name=&quot;groupRoleAttribute&quot;&gt;&lt;value&gt;ou&lt;/value&gt;&lt;/property&gt; &lt;property name="groupRoleAttribute"&gt;&lt;value&gt;ou&lt;/value&gt;&lt;/property&gt;
&lt;/bean&gt; &lt;/bean&gt;
&lt;/constructor-arg&gt; &lt;/constructor-arg&gt;
&lt;/bean&gt; &lt;/bean&gt;
</programlisting> </programlisting> This would set up the provider to access an LDAP
server with URL
<literal>ldap://monkeymachine:389/dc=acegisecurity,dc=org</literal>.
Authentication will be performed by attempting to bind with the DN
<literal>uid=&lt;user-login-name&gt;,ou=people,dc=acegisecurity,dc=org</literal>.
After successful authentication, roles will be assigned to the user by
searching under the DN
<literal>ou=groups,dc=acegisecurity,dc=org</literal> with the default
filter <literal>(member=&lt;user's-DN&gt;)</literal>. The role name
will be taken from the <quote>ou</quote> attribute of each
match.</para>
This would set up the provider to access an LDAP server with URL <para>We've also included the configuration for a user search object,
<literal>ldap://monkeymachine:389/dc=acegisecurity,dc=org</literal>. Authentication will be performed by which uses the filter
attempting to bind with the DN <literal>uid=&lt;user-login-name&gt;,ou=people,dc=acegisecurity,dc=org</literal>. <literal>(uid=&lt;user-login-name&gt;)</literal>. This could be used
After successful authentication, roles will be assigned to the user by searching under the DN instead of the DN-pattern (or in addition to it), by setting the
<literal>ou=groups,dc=acegisecurity,dc=org</literal> with the default filter <literal>(member=&lt;user's-DN&gt;)</literal>. authenticator's <property>userSearch</property> property. The
The role name will be taken from the <quote>ou</quote> attribute of each match. autheticator would then call the search object to obtain the correct
</para> user's DN before attempting to bind as this user.</para>
<para>
We've also included the configuration for a user search object, which uses the filter
<literal>(uid=&lt;user-login-name&gt;)</literal>. This could be used
instead of the DN-pattern (or in addition to it), by setting the authenticator's
<property>userSearch</property> property. The autheticator would then call the search
object to obtain the correct user's DN before attempting to bind as this user.
</para>
</sect2> </sect2>
</sect1>
</sect1>
<sect1 id="security-channels"> <sect1 id="security-channels">
<title>Channel Security</title> <title>Channel Security</title>
@ -5394,12 +5417,12 @@ INSERT INTO acl_permission VALUES (null, 6, 'scott', 1);</programlisting></para>
<title>Further Information</title> <title>Further Information</title>
<para>Questions and comments on the Acegi Security System for Spring are <para>Questions and comments on the Acegi Security System for Spring are
welcome. Please use the Spring Community Forum web site at welcome. Please use the Spring Community Forum web site at <ulink
<ulink url="http://forum.springframework.org"></ulink>. You're also welcome url="http://forum.springframework.org"></ulink>. You're also welcome to
to join the acegisecurity-developer mailing list. Our project home page join the acegisecurity-developer mailing list. Our project home page
(where you can obtain the latest release of the project and access to (where you can obtain the latest release of the project and access to
CVS, mailing lists, forums etc) is at CVS, mailing lists, forums etc) is at <ulink
<ulink url="http://acegisecurity.org"></ulink>.</para> url="http://acegisecurity.org"></ulink>.</para>
</sect1> </sect1>
</chapter> </chapter>
</book> </book>