SEC-696: Update Maven Site for deployment to springframework.org. Removed much of the existing acegi site files.

This commit is contained in:
Luke Taylor 2008-03-06 13:41:59 +00:00
parent ff4650890c
commit 44f1e751a9
37 changed files with 1 additions and 2222 deletions

View File

@ -31,7 +31,7 @@ Subversion Usage
+----------------------------------------------------------------------------------------------------------------------+
Specific tagged releases can be checked out from the URL
{{{"http://acegisecurity.svn.sourceforge.net/svnroot/acegisecurity/spring-security/tags/}}}.
{{{"http://acegisecurity.svn.sourceforge.net/svnroot/acegisecurity/spring-security/tags/"}}}.

View File

@ -1,16 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.1 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
New Features:
o Initial public release
Have fun!
-The acegi-security-doc team

View File

@ -1,34 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.2 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
New Features:
o Added Commons Attributes support and sample (thanks to Cameron Braid)
o Added JBoss container adapter
o Added Resin container adapter
o Added JDBC DAO authentication provider
o Added several filter implementations for container adapter integration
o Added SecurityInterceptor startup time validation of ConfigAttributes
o Added more unit tests
Fixed bugs:
o Fixed switch block in voting decision manager implementations
Changes:
o Refactored ConfigAttribute to interface and added concrete implementation
o Enhanced diagnostics information provided by sample application debug.jsp
o Modified sample application for wider container portability (Resin, JBoss)
o Removed Spring MVC interceptor for container adapter integration
o Documentation improvements
Have fun!
-The acegi-security-doc team

View File

@ -1,28 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.3 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
New Features:
o Added "in container" unit test system for container adapters and sample app
o Added library extractor tool to reduce the "with deps" ZIP release sizes
o Added unit test to the attributes sample
o Added Jalopy source formatting
Changes:
o Modified all files to use net.sf.acegisecurity namespace
o Renamed springsecurity.xml to acegisecurity.xml for consistency
o Reduced length of ZIP and JAR filenames
o Clarified licenses and sources for all included libraries
o Updated documentation to reflect new file and package names
o Setup Sourceforge.net project and added to CVS etc
Have fun!
-The acegi-security-doc team

View File

@ -1,40 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.4 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
New Features:
o Added HTTP session authentication as an alternative to container adapters
o Added HTTP request security interceptor (offers considerable flexibility)
o Added security taglib
o Added Clover test coverage instrumentation (currently 97.2%)
o Added support for Catalina (Tomcat) 4.1.30 to in-container integration
tests
o Added HTML test and summary reporting to in-container integration tests
Fixed bugs:
o Fixed case handling support in data access object authentication provider
Changes:
o Updated JARs to Spring Framework release 1.0, with associated AOP changes
o Updated to Apache License version 2.0
o Updated copyright with permission of past contributors
o Refactored unit tests to use mock objects and focus on a single class each
o Refactored many classes to enable insertion of mock objects during testing
o Refactored core classes to ease support of new secure object types
o Changed package layout to better describe the role of contained items
o Changed the extractor to extract additional classes from JBoss and Catalina
o Changed Jetty container adapter configuration (see reference documentation)
o Improved AutoIntegrationFilter handling of deployments without JBoss JARs
o Documentation improvements
Have fun!
-The acegi-security-doc team

View File

@ -1,37 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.5.1 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
New Features:
o Added samples/quick-start
o Added NullRunAsManager and made default for AbstractSecurityInterceptor
o Added event notification (see net.sf.acegisecurity.providers.dao.event)
Fixed bugs:
o Fixed issue with hot deploy of EhCacheBasedTicketCache (used with CAS)
o Fixed issue with NullPointerExceptions in taglib
Changes:
o Updated JAR to Spring 1.0.2
o Updated JAR to Commons Attributes CVS snapshot from Spring 1.0.2 release
o Updated GrantedAuthorityImpl to be serializable (JBoss support)
o Updated Authentication interface to present extra details for a request
o Updated Authentication interface to subclass java.security.Principal
o Refactored DaoAuthenticationProvider caching (refer to reference docs)
o Improved HttpSessionIntegrationFilter to manage additional attributes
o Improved URL encoding during redirects
o Removed DaoAuthenticationToken and session-based caching
o Documentation improvements
o Upgrade Note: DaoAuthenticationProvider no longer has a "key" property
Have fun!
-The acegi-security-doc team

View File

@ -1,42 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.5 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
New Features:
o Added single sign on support via Yale Central Authentication Service (CAS)
o Added full support for HTTP Basic Authentication
o Added caching for DaoAuthenticationProvider successful authentications
o Added Burlap and Hessian remoting to Contacts sample application
o Added pluggable password encoders including plaintext, SHA and MD5
o Added pluggable salt sources to enhance security of hashed passwords
o Added FilterToBeanProxy to obtain filters from Spring application context
o Added support for prepending strings to roles created by JdbcDaoImpl
o Added support for user definition of SQL statements used by JdbcDaoImpl
o Added definable prefixes to avoid expectation of "ROLE_" GrantedAuthoritys
o Added pluggable AuthenticationEntryPoints to SecurityEnforcementFilter
o Added Apache Ant path syntax support to SecurityEnforcementFilter
o Added filter to automate web channel requirements (eg HTTPS redirection)
Fixed bugs:
o Fixed FilterInvocation.getRequestUrl() to also include getPathInfo()
o Fixed Contacts sample application tags
Changes:
o Updated JAR to Spring 1.0.1
o Updated several classes to use absolute (not relative) redirection URLs
o Refactored filters to use Spring application context lifecycle support
o Improved constructor detection of nulls in User and other key objects
o Established acegisecurity-developer mailing list
o Documentation improvements
Have fun!
-The acegi-security-doc team

View File

@ -1,39 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.6.1 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
New Features:
o Added additional DaoAuthenticationProvider event when user not found
o Added Authentication.getDetails() to DaoAuthenticationProvider response
o Added DaoAuthenticationProvider.hideUserNotFoundExceptions (default=true)
o Added PasswordAuthenticationProvider for password-validating DAOs (eg LDAP)
o Added FilterToBeanProxy compatibility with ContextLoaderServlet (lazy
inits)
o Added convenience methods to ConfigAttributeDefinition
Fixed bugs:
o Fixed MethodDefinitionAttributes to implement ObjectDefinitionSource change
o Fixed EH-CACHE-based caching implementation behaviour when cache exists
o Fixed Ant "release" target not including project.properties
o Fixed GrantedAuthorityEffectiveAclsResolver if null ACLs provided to method
Changes:
o Resolved to use http://apr.apache.org/versioning.html for future versioning
o Improved sample applications' bean reference notation
o Clarified contract for ObjectDefinitionSource.getAttributes(Object)
o Extracted removeUserFromCache(String) to UserCache interface
o Improved ConfigAttributeEditor so it trims preceding and trailing spaces
o Refactored UsernamePasswordAuthenticationToken.getDetails() to Object
o Documentation improvements
Have fun!
-The acegi-security-doc team

View File

@ -1,50 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.6 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
New Features:
o Added domain object instance access control list (ACL) packages
o Added feature so DaoAuthenticationProvider returns User in Authentication
o Added AbstractIntegrationFilter.secureContext property for custom contexts
o Added stack trace logging to SecurityEnforcementFilter
o Added exception-specific target URLs to AbstractProcessingFilter
o Added JdbcDaoImpl hook so subclasses can insert custom granted authorities
o Added AuthenticationProvider that wraps JAAS login modules
o Added support for EL expressions in the authz tag library
o Added failed Authentication object to AuthenticationExceptions
o Added signed JARs to all official release builds (see readme.txt)
o Added remote client authentication validation package
o Added protected sendAccessDeniedError method to SecurityEnforcementFilter
Fixed bugs:
o Fixed CasAuthenticationToken if proxy granting ticket callback not
requested
o Fixed EH-CACHE handling on web context refresh
Changes:
o Updated Authentication to be serializable (Weblogic support)
o Updated JAR to Spring 1.1 RC 1
o Updated to Clover 1.3
o Updated to HSQLDB version 1.7.2 Release Candidate 6D
o Refactored User to net.sf.acegisecurity.UserDetails interface
o Refactored CAS package to store UserDetails in CasAuthenticationToken
o Improved organisation of DaoAuthenticationProvider to facilitate
subclassing
o Improved test coverage (now 98.3%)
o Improved JDBC-based tests to use in-memory database rather than filesystem
o Fixed Linux compatibility issues (directory case sensitivity etc)
o Fixed AbstractProcessingFilter to handle servlet spec container differences
o Fixed AbstractIntegrationFilter to resolve a Weblogic compatibility issue
o Documentation improvements
Have fun!
-The acegi-security-doc team

View File

@ -1,68 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.7.0 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
New Features:
o Major CVS repository restructure to support Maven and eliminate libraries
o Added AfterInvocationManager to mutate objects return from invocations
o Added BasicAclEntryAfterInvocationProvider to ACL evaluate returned Object
o Added BasicAclEntryAfterInvocationCollectionFilteringProvider
o Added security propagation during RMI invocations (from sandbox)
o Added security propagation for Spring's HTTP invoker
o Added BasicAclEntryVoter, which votes based on AclManager permissions
o Added AspectJ support (especially useful for instance-level security)
o Added MethodDefinitionSourceAdvisor for performance and autoproxying
o Added MethodDefinitionMap querying of interfaces defined by secure objects
o Added AuthenticationProcessingFilter.setDetails for use by subclasses
o Added 403-causing exception to HttpSession via SecurityEnforcementFilter
o Added net.sf.acegisecurity.intercept.event package
o Added BasicAclExtendedDao interface and JdbcExtendedDaoImpl for ACL CRUD
o Added additional remoting protocol demonstrations to Contacts sample
o Added AbstractProcessingFilter property to always use defaultTargetUrl
o Added ContextHolderAwareRequestWrapper to integrate with getRemoteUser()
o Added attempted username to view if processed by
AuthenticationProcessingFilter
o Added UserDetails account and credentials expiration methods
o Added exceptions and events to support new UserDetails methods
o Added new exceptions to JBoss container adapter
Fixed bugs:
o Fixed ambiguous column references in JdbcDaoImpl default query
o Fixed AbstractProcessingFilter to use removeAttribute (JRun compatibility)
o Fixed GrantedAuthorityEffectiveAclResolver support of UserDetails
principals
o Fixed HttpSessionIntegrationFilter "cannot commit to container" during
logoff
Changes:
o Major improvements to Contacts sample application (now demos ACL security)
o Improved BasicAclProvider to only respond to specified ACL object requests
o Refactored MethodDefinitionSource to work with Method, not MethodInvocation
o Refactored AbstractFilterInvocationDefinitionSource to work with URL
Strings alone
o Refactored AbstractSecurityInterceptor to better support other AOP
libraries
o Improved performance of JBoss container adapter (see reference docs)
o Made DaoAuthenticationProvider detect null in Authentication.principal
o Improved JaasAuthenticationProvider startup error detection
o Refactored EH-CACHE implementations to use Spring IoC defined caches
instead
o AbstractProcessingFilter now has various hook methods to assist subclasses
o DaoAuthenticationProvider better detects AuthenticationDao interface
violations
o The User class has a new constructor (the old constructor is deprecated)
o Moved MethodSecurityInterceptor to ...intercept.method.aopalliance package
o Documentation improvements
o Test coverage improvements
Have fun!
-The acegi-security-doc team

View File

@ -1,18 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.7.1 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
Fixed bugs:
o AbstractIntegrationFilter elegantly handles IOExceptions and
ServletExceptions within filter chain (see
http://opensource.atlassian.com/projects/spring/browse/SEC-20)
Have fun!
-The acegi-security-doc team

View File

@ -1,59 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.8.0 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
New Features:
o Added Digest Authentication support (RFC 2617 and RFC 2069)
o Added pluggable remember-me services
o Added pluggable mechnism to prevent concurrent login sessions
o FilterChainProxy added to significantly simplify web.xml configuration of
Acegi Security
o AuthenticationProcessingFilter now provides hook for extra credentials (eg
postcodes)
o New WebAuthenticationDetails class now used by processing filters for
Authentication.setDetails()
o Additional debug-level logging
o Improved Tapestry support in AbstractProcessingFilter
Fixed bugs:
o Correct issue with JdbcDaoImpl default SQL query not using consistent case
sensitivity
o Improve Linux and non-Sun JDK (specifically IBM JDK) compatibility
o Log4j now included in generated WAR artifacts (fixes issue with Log4j
listener)
o Correct NullPointerException in FilterInvocationDefinitionSource
implementations
Changes:
o Made ConfigAttributeDefinition and ConfigAttribute Serializable
o User now accepts blank passwords (null passwords still rejected)
o FilterToBeanProxy now searches hierarchical bean factories
o User now accepted blank passwords (null passwords still rejected)
o ContextHolderAwareRequestWrapper now provides a getUserPrincipal() method
o HttpSessionIntegrationFilter no longer creates a HttpSession unnecessarily
o FilterSecurityInterceptor now only executes once per request (improves
performance with SiteMesh)
o JaasAuthenticatinProvider now uses System.property
"java.security.auth.login.config"
o JaasAuthenticationCallbackHandler Authentication is passed to handle method
setAuthentication removed
o Added AuthenticationException to the AutenticationEntryPoint.commence
method signature
o Added AccessDeniedException to the
SecurityEncorcementFilter.sendAccessDeniedError method signature
o FilterToBeanProxy now addresses lifecycle mismatch (IoC container vs
servlet container) issue
o Significantly refactor "well-known location model" to authentication
processing mechanism and HttpSessionContextIntegrationFilter model
Have fun!
-The acegi-security-doc team

View File

@ -1,18 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.8.1.1 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
Fixed bugs:
o HttpSessionContextIntegrationFilter elegantly handles IOExceptions and
ServletExceptions within filter chain (see
http://opensource.atlassian.com/projects/spring/browse/SEC-20)
Have fun!
-The acegi-security-doc team

View File

@ -1,43 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.8.1 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
New Features:
o X509 (certificate-based) authentication support
Fixed bugs:
o SecurityEnforcementFilter caused NullPointerException when anonymous
authentication used with BasicProcessingFilterEntryPoint
o FilterChainProxy now supports replacement of ServletRequest and
ServetResponse by Filter beans
o Corrected Authz parsing of whitespace in GrantedAuthoritys
o TokenBasedRememberMeServices now respects expired users, expired
credentials and disabled users
o HttpSessionContextIntegrationFilter now handles HttpSession invalidation
without redirection
o StringSplitUtils.split() ignored delimiter argument
o DigestProcessingFilter now provides userCache getter and setter
o Contacts Sample made to work with UserDetails-based Principal
Changes:
o UserDetails now advises locked accounts, with corresponding
DaoAuthenticationProvider events and enforcement
o ContextHolderAwareRequestWrapper methods return null if user is anonymous
o AbstractBasicAclEntry improved compatibility with Hibernate
o User now provides a more useful toString() method
o Update to match Spring 1.1.5 official JAR dependencies (NB: now using
Servlet 2.4 and related JSP/taglib JARs)
o Documentation improvements
o Test coverage improvements
Have fun!
-The acegi-security-doc team

View File

@ -1,33 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.8.2 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
Fixed bugs:
o Correct location of AuthenticationSimpleHttpInvokerRequestExecutor in
clientContext.xml
o TokenBasedRememberMeServices changed to use long instead of int for
tokenValiditySeconds (SPR-807)
o Handle null Authentication.getAuthorities() in AuthorizeTag
o PasswordDaoAuthenticationProvider no longer stores String against
Authentication.setDetails()
Changes:
o Update commons-codec dependency to 1.3
o AbstractProcessingFilter no longer has setters for failures, it uses the
exceptionMappings property
o Update to match Spring 1.2-RC2 official JAR dependencies
o AuthenticationProcessingFilter now provides an obtainUsername method
o Correct PathBasedFilterInvocationDefinitionMap compatibility with Spring
1.2-RC2
o Refactoring to leverage Spring's Assert class and mocks where possible
Have fun!
-The acegi-security-doc team

View File

@ -1,18 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.8.3 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
Fixed bugs:
o HttpSessionContextIntegrationFilter elegantly handles IOExceptions and
ServletExceptions within filter chain (see
http://opensource.atlassian.com/projects/spring/browse/SEC-20)
Have fun!
-The acegi-security-doc team

View File

@ -1,17 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 0.9.0 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
Changes:
o All changes are in JIRA at
http://opensource2.atlassian.com/projects/spring/secure/ReleaseNote.jspa?projectId=10040
Have fun!
-The acegi-security-doc team

View File

@ -1,17 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 1.0.0 Final release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
Changes:
o All changes are in JIRA at
http://opensource2.atlassian.com/projects/spring/secure/ReleaseNote.jspa?projectId=10040
Have fun!
-The acegi-security-doc team

View File

@ -1,17 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 1.0.0 RC1 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
Changes:
o All changes are in JIRA at
http://opensource2.atlassian.com/projects/spring/secure/ReleaseNote.jspa?projectId=10040
Have fun!
-The acegi-security-doc team

View File

@ -1,17 +0,0 @@
The acegi-security-doc team is pleased to announce the Acegi Security System
for Spring 1.0.0 RC2 release!
http://acegisecurity.org/
Acegi Security System for Spring
Changes in this version include:
Changes:
o All changes are in JIRA at
http://opensource2.atlassian.com/projects/spring/secure/ReleaseNote.jspa?projectId=10040
Have fun!
-The acegi-security-doc team

View File

@ -1,55 +0,0 @@
#poweredBy {
visibility: hidden;
}
#bannerLeft img {
padding: 35px 0 0 25px
}
#leftColumn {
margin: 30px 0 0 5px;
border: none;
background-color: white;
}
#navcolumn li {
line-height: 1.5em;
font-size: 0.95em;
}
#navcolumn h5 {
font-size: 0.95em;
}
h2 {
padding: 0;
border: none;
color: black;
background-color: white;
font-weight:bold;
font-size: large;
text-align: center;
}
h3 {
padding: 0;
border: none;
color: black;
background-color: white;
font-weight: normal;
font-size: large;
}
h4 {
padding: 0;
border: none;
background-color: white;
color: black;
font-weight: normal;
font-size: large;
}
h5 {
padding: 0;
background-color: white;
color: black;
}

View File

@ -1,92 +0,0 @@
--- $Id$
--- Sample Hypersonic SQL compatible schema and data
---
--- All Spring Security JDBC DAOs can be customised to use a different schema.
--- In addition, the Spring Security JDBC DAOs do not even need to be used
--- with Spring Security, and an entirely customised persistence strategy
--- can be employed via standard interfaces (eg in-memory, Hibernate etc).
SET IGNORECASE TRUE;
CREATE TABLE users (
username VARCHAR(50) NOT NULL PRIMARY KEY,
password VARCHAR(50) NOT NULL,
enabled BIT NOT NULL
);
CREATE TABLE authorities (
username VARCHAR(50) NOT NULL,
authority VARCHAR(50) NOT NULL
);
CREATE UNIQUE INDEX ix_auth_username ON authorities ( username, authority );
ALTER TABLE authorities ADD CONSTRAINT fk_authorities_users foreign key (username) REFERENCES users(username);
INSERT INTO users VALUES ('rod', 'koala', true);
INSERT INTO users VALUES ('dianne', 'emu', true);
INSERT INTO users VALUES ('scott', 'wombat', true);
INSERT INTO users VALUES ('peter', 'opal', false);
INSERT INTO authorities VALUES ('rod', 'ROLE_TELLER');
INSERT INTO authorities VALUES ('rod', 'ROLE_SUPERVISOR');
INSERT INTO authorities VALUES ('dianne', 'ROLE_TELLER');
INSERT INTO authorities VALUES ('scott', 'ROLE_TELLER');
INSERT INTO authorities VALUES ('peter', 'ROLE_TELLER');
--- Indexes auto created in HSQLDB for primary keys and unique columns
CREATE TABLE acl_object_identity (
id BIGINT GENERATED BY DEFAULT AS IDENTITY(START WITH 0) NOT NULL PRIMARY KEY,
object_identity VARCHAR_IGNORECASE(250) NOT NULL,
parent_object BIGINT,
acl_class VARCHAR_IGNORECASE(250) NOT NULL,
CONSTRAINT unique_object_identity UNIQUE(object_identity),
FOREIGN KEY (parent_object) REFERENCES acl_object_identity(id)
);
CREATE TABLE acl_permission (
id BIGINT GENERATED BY DEFAULT AS IDENTITY(START WITH 0) NOT NULL PRIMARY KEY,
acl_object_identity BIGINT NOT NULL,
recipient VARCHAR_IGNORECASE(100) NOT NULL,
mask INTEGER NOT NULL,
CONSTRAINT unique_recipient UNIQUE(acl_object_identity, recipient),
FOREIGN KEY (acl_object_identity) REFERENCES acl_object_identity(id)
);
--- Mask integer 0 = no permissions
--- Mask integer 1 = administer
--- Mask integer 2 = read
--- Mask integer 6 = read and write permissions
--- Mask integer 14 = read and write and create permissions
---------------------------------------------------------------------
--- *** INHERITED RIGHTS FOR DIFFERENT INSTANCES AND RECIPIENTS ***
--- INSTANCE RECIPIENT PERMISSION(S) (COMMENT #INSTANCE)
---------------------------------------------------------------------
--- 1 ROLE_SUPERVISOR Administer
--- 2 ROLE_SUPERVISOR None (overrides parent #1)
--- rod Read
--- 3 ROLE_SUPERVISOR Administer (from parent #1)
--- scott Read, Write, Create
--- 4 ROLE_SUPERVISOR Administer (from parent #1)
--- 5 ROLE_SUPERVISOR Administer (from parent #3)
--- scott Read, Write, Create (from parent #3)
--- 6 ROLE_SUPERVISOR Administer (from parent #3)
--- scott Administer (overrides parent #3)
---------------------------------------------------------------------
INSERT INTO acl_object_identity VALUES (1, 'org.springframework.security.acl.DomainObject:1', null, 'org.springframework.security.acl.basic.SimpleAclEntry');
INSERT INTO acl_object_identity VALUES (2, 'org.springframework.security.acl.DomainObject:2', 1, 'org.springframework.security.acl.basic.SimpleAclEntry');
INSERT INTO acl_object_identity VALUES (3, 'org.springframework.security.acl.DomainObject:3', 1, 'org.springframework.security.acl.basic.SimpleAclEntry');
INSERT INTO acl_object_identity VALUES (4, 'org.springframework.security.acl.DomainObject:4', 1, 'org.springframework.security.acl.basic.SimpleAclEntry');
INSERT INTO acl_object_identity VALUES (5, 'org.springframework.security.acl.DomainObject:5', 3, 'org.springframework.security.acl.basic.SimpleAclEntry');
INSERT INTO acl_object_identity VALUES (6, 'org.springframework.security.acl.DomainObject:6', 3, 'org.springframework.security.acl.basic.SimpleAclEntry');
INSERT INTO acl_permission VALUES (null, 1, 'ROLE_SUPERVISOR', 1);
INSERT INTO acl_permission VALUES (null, 2, 'ROLE_SUPERVISOR', 0);
INSERT INTO acl_permission VALUES (null, 2, 'rod', 2);
INSERT INTO acl_permission VALUES (null, 3, 'scott', 14);
INSERT INTO acl_permission VALUES (null, 6, 'scott', 1);

Binary file not shown.

Before

Width:  |  Height:  |  Size: 8.6 KiB

View File

@ -1,153 +0,0 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<document><properties><title>External Web Articles covering Spring Security</title></properties><body><section name="External Web Articles covering Spring Security"><p>Here are some of the external pages mentioning Spring Security. If you've
found another, please let us know.
<ul>
<li><b><a href="http://forum.springframework.org">Spring Forums</a></b>:
The first place to look for Spring Security support (use the 'search' function).<br></br><br></br>
</li>
<li><b><a href="mail-lists.html">Spring Security Mailing Lists</a></b>:
If you'd like to discuss development of the project.<br></br><br></br>
</li>
<li><b><a href="powering.html">Numerous frameworks using Spring Security</a></b>:
Look here first for how to integrate with major third-party frameworks...<br></br><br></br>
</li>
<li><b><a href="http://www.vorburger.ch/blog1/2006/10/propagating-acegis-security-context-in.html">Propagating Acegi Security's Context in a WSS UsernameToken SOAP Header via XFire using WSS4J</a></b>:
Thanks to Michael Vorburger.<br></br><br></br>
</li>
<li><b><a href="http://www.ibm.com/developerworks/java/library/j-acegi1/index.html">DeveloperWorks Series on Using Acegi Security</a></b>:
A 3-part series by Bilal Siddiqui.<br></br><br></br>
</li>
<li><b><a href="http://alexfletcher.typepad.com/all_bets_off/2006/02/what_acegi_mean.html">What Acegi Means to the Enterprise</a></b>:
A blog entry by Alex Fletcher.<br></br><br></br>
</li>
<li><b><a href="http://jroller.com/page/sjivan?entry=ajax_based_login_using_aceci">AJAX-based login via Acegi Security</a></b>:
Sanjiv Jivan offers a way of approaching AJAX login.<br></br><br></br>
</li>
<li><b><a href="http://weblog.morosystems.cz/spring/Spring-Acegi-JCaptcha-integration">Acegi Security and Captcha Layer</a></b>:
How to use Acegi Security with JCaptcha.<br></br><br></br>
</li>
<li><b><a href="http://java.sys-con.com/read/171482_1.htm">Introduction to Acegi: Mastering the security framework</a></b>:
Java Developer's Journal (JDJ) article by David Hardwick.<br></br><br></br>
</li>
<li><b><a href="http://www.javalobby.org/articles/acegisecurity/part1.jsp">Securing Your Java Applications - Acegi Security Style</a></b>:
Matthew Porter wrote this good introductory article for Javalobby.<br></br><br></br>
</li>
<li><b><a href="http://home.hccnet.nl/bart.van.riel/">Acegi Spring Tutorial</a></b>:
Available in PDF and HTML formats, thanks to Bart van Riel.<br></br><br></br>
</li>
<li><b><a href="http://peter.jteam.nl/wp-trackback.php?p=6">Testing Acegi Security</a></b>:
Peter Veentjer discussed how to test Acegi Security-protected objects in isolation.<br></br><br></br>
</li>
<li><b><a href="http://iremia.univ-reunion.fr/intranet/wiki/Wiki.jsp?page=DWRandAcegi">Integrating DWR and Acegi Security</a></b>:
Explanation on using Acegi Security's MethodSecurityInterceptor with DWR.<br></br><br></br>
</li>
<li><b><a href="http://dev.eclipse.org/mhonarc/lists/aspectj-users/msg05355.html">AspectJ with Acegi Security</a></b>:
AspectJ with Acegi Security thread on the AspectJ list.<br></br><br></br>
</li>
<li><b><a href="http://www.acooke.org/cute/SessionLim0.html">Session Limitation with Acegi Security</a></b>:
Andrew Cooke discusses using concurrent sessions.<br></br><br></br>
</li>
<li><b><a href="http://jroller.com/page/paskos?entry=acegi_portable_independent_and_rich">Acegi: Portable, Independent and Rich Webapp Security</a></b>:
Pascal Gehl relates his experience in migrating from CMA to Acegi Security.<br></br><br></br>
</li>
<li><b><a href="http://affy.blogspot.com/2005/10/how-do-i-create-private-bean-using.html">Creating a private bean with Acegi</a></b>:
By David Medinets.<br></br><br></br>
</li>
<li><b><a href="http://affy.blogspot.com/2005/10/acegi-tutorial-example-of-method-based.html">Method based access control and JUnit for testing</a></b>:
By David Medinets.<br></br><br></br>
</li>
<li><b><a href="http://affy.blogspot.com/2005/10/acegi-example-of-when-to-use.html">Acegi: When to use AffirmativeBased voting</a></b>:
By David Medinets.<br></br><br></br>
</li>
<li><b><a href="http://raibledesigns.com/page/rd/20050617#presentations_acegi_security_and_spring">Acegi Security High-Level Overview Presentation</a></b>:
Matt Raible has provided a nice <a href="http://www2.java.no/web/files/moter/mai05/AcegiSecurity.pdf">PDF presentation</a> comparing Acegi Security and J2EE CMA.<br></br><br></br>
</li>
<li><b><a href="http://jroller.com/page/raible?entry=how_to_upgrade_to_upgrade">How to upgrade to upgrade from Acegi Security 0.9.0 to 1.0 RC1</a></b>:
Matt Raible's upgrade instructions.<br></br><br></br>
</li>
<li><b><a href="http://jaredtech.blogspot.com/2005/08/webworkvelocityacegi-config.html">Webwork + Velocity + Acegi Config</a></b>:
Jared Odulio offers some configuration tips.<br></br><br></br>
</li>
<li><b><a href="http://www.almaer.com/blog/archives/000640.html">Container Managed Security: If your standard covers a lowest common denominator</a></b>:
"For this reason I end up using something like Acegi Security", Dion Almaer comments after listing a series of missing hooks from the Servlet Spec security approach.<br></br><br></br>
</li>
<li><b><a href="http://opensource.atlassian.com/seraph/status.html">Seraph Development Status</a></b>:
The fine folks at Atlassian have noted, "for more complex needs than Seraph meets, we suggest considering alternative frameworks like ACEGI, which provides more functionality (at the cost of greater complexity)."<br></br><br></br>
</li>
<li><b><a href="http://www.javalobby.org/java/forums/t91426.html">Implementing application-specific UserDetails in Acegi</a></b>:
Andrei Tudose has provided a JavaLobby article on this common customization point.<br></br><br></br>
</li>
<li><b><a href="http://raibledesigns.com/page/rd/20050104#re_j2ee_app_server_security">J2EE App Server Security</a></b>:
"After using Acegi for the last month, I think I'm going to ditch the 'standard' J2EE security stuff", blogged Matt Raible. I should note
our CVS tree has become stable and there are <a href="building.html">build instructions</a>.<br></br><br></br>
</li>
<li><b><a href="http://raibledesigns.com/wiki/Wiki.jsp?page=AppFuseAuthentication">AppFuse Authentication</a></b>:
Discusses AppFuse 1.8+'s replacement of Container-Managed Authentication (CMA) with Acegi Security.<br></br><br></br>
</li>
<li><b><a href="http://www.jroller.com/page/fairTrade?entry=integrating_acegi_and_jsf_revisited"> Integrating Acegi and JSF: Revisited</a></b>:
Thanks to tony_k.<br></br><br></br>
</li>
<li><b><a href="http://www.jroller.com/page/vtatai/20050505#integrating_acegi_with_jsf">Java Server Faces (JSF) with Acegi Security</a></b>:
Covers using these two frameworks - thanks to Victor Tatai.<br></br><br></br>
</li>
<li><b><a href="http://www.jroller.com/page/cagataycivici?entry=acegi_jsf_components_hit_the">Acegi Security Java Server Faces (JSF) components</a></b>:
Cagatay Civici has provided a JSF version of our taglibs.<br></br><br></br>
</li>
<li><b><a href="http://raibledesigns.com/wiki/Wiki.jsp?page=AppFuseSecurity">Acegi Security use with AppFuse</a></b>:
The popular AppFuse project now uses Acegi Security instead of container managed authentication!<br></br><br></br>
</li>
<li><b><a href="http://jroller.com/page/habuma/20041124#simplifying_acegi_configuration">Simplifying Acegi Configuration</a></b>:
Craig Walls provides a good approach to reusing your Acegi Security configuration between projects. This has been
<a href="http://www.picklematrix.net/archives/000974.html">updated</a> by Seth Ladd for release 0.7.0.<br></br><br></br>
</li>
<li><b><a href="http://confluence.sourcebeat.com/display/SPL/Update+Chapters">Spring Live Update Chapters</a></b>:
Matt Raible is including Acegi Security in Chapter 12 of his popular ebook.<br></br><br></br>
</li>
<li><b><a href="http://www.china-pub.com/computers/common/info.asp?id=24483">Mastering Spring (Chinese) Book</a></b>:
Acegi Security is included in Chapter 17 of this book.<br></br><br></br>
</li>
<li><b><a href="http://www.manning.com/walls2">Spring In Action</a></b>:
Craig Walls has also written another popular Spring book, which includes Acegi Security in Chapter 11.<br></br><br></br>
</li>
<li><b><a href="http://www.ja-sig.org/products/cas/client/faq.html#8">Central Authentication Service FAQ</a></b>:
A general overview of how Acegi Security is used with JA-SIG's CAS.<br></br><br></br>
</li>
<li><b><a href="http://oness.sourceforge.net/JavaHispano%20Acegi%20presentacion.pdf">JavaHispano 2004 Acegi Security Presentation</a></b>:
Carlos Sanchez's presentation (in Spanish), delivered 17 December 2004. An
<a href="http://oness.sourceforge.net/JavaHispano%20Acegi.pdf">article</a> was also published.
<br></br><br></br>
</li>
<li><b><a href="http://up-u.com/?p=183">Annotations in Acegi Security</a></b>:
An implementation of JDK 1.5 annotations with Acegi Security's SecurityConfig.<br></br><br></br>
</li>
<li><b><a href="http://www.fstxblog.com/completely-geeked/2005/05/java-acegi-security-simple-example-v2.html">Acegi Security - The Simplest Possible Example</a></b>:
Reid Carlberg has provided a downloadable WAR containing the simplest possible Acegi Security 0.8.2 configuration.<br></br><br></br>
</li>
<li><b><a href="http://fishdujour.typepad.com/blog/2005/02/junit_testing_w.html">JUnit Testing with Acegi Security</a></b>:
A tip from Gavin Terrill on unit testing with Acegi Security.<br></br><br></br>
</li>
<li><b><a href="http://jroller.com/page/carlossg/20050226#acegi_security_reducing_configuration_in">Acegi Security: reducing configuration in web.xml</a></b>:
Carlos Sanchez provides an overview of our new <code>FilterChainProxy</code> class.<br></br><br></br>
</li>
<li><b><a href="http://www.manageability.org/blog/stuff/single-sign-on-in-java/view">Open Source Identity Management Solutions Written in Java</a></b>:
From <code>manageability.org</code>.<br></br><br></br>
</li>
<li><b><a href="http://www.porterhome.com/blog/matthew/2005/03/13/1110732830996.html">WW Live: Integrating Acegi and WebWork</a></b>:
Discussion about enhancing Acegi Security and WebWork integration.<br></br><br></br>
</li>
<li><b><a href="http://www.orablogs.com/fnimphius/archives/000730.html">J2EE Security: Struts "Shale" proposal does improve web application security</a></b>:
Frank Nimphius' blog contains some comments on Acegi Security. See
our <a href="faq.html">FAQ</a> for additional JAAS comments.<br></br><br></br>
</li>
<li><b><a href="http://jakarta.apache.org/commons/attributes/faq.html">Anyone else using C-A (Commons Attributes)?</a></b>: Acegi Security made the list
of projects using Jakarta Commons Attributes. Our
<a href="/multiproject/spring-security-sample-attributes/index.html">Attributes Sample</a>
demonstrates C-A integration.<br></br><br></br>
</li>
<li><b><a href="http://www.arroco.com/cgi-bin/blosxom.cgi/2005/08/22#acegi-javadoc">Documenting the Future At the Expense of the Present</a></b>:
Blog entry on the JavaDocs missing from Acegi release ZIPs. They're actually there. Just check /docs/multiproject/acegi-security/apidocs/.<br></br><br></br>
</li>
</ul>
</p></section></body></document>

View File

@ -1,293 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<!--
* ========================================================================
*
* Copyright 2004, 2005 Acegi Technology Pty Limited
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* ========================================================================
**** THIS FILE SHOULD ONLY BE USED TO POINT TO JIRA FOR EACH RELEASE!!!! (BPA, 4 November 2005) ****
-->
<document>
<properties>
<title>Spring Security changes</title>
</properties>
<body>
<release version="1.0.0 Final" date="In CVS">
<action dev="benalex" type="update">All changes are in JIRA at http://opensource2.atlassian.com/projects/spring/secure/ReleaseNote.jspa?projectId=10040</action>
</release>
<release version="1.0.0 RC2" date="2006-02-09">
<action dev="benalex" type="update">All changes are in JIRA at http://opensource2.atlassian.com/projects/spring/secure/ReleaseNote.jspa?projectId=10040</action>
</release>
<release version="1.0.0 RC1" date="2005-12-05">
<action dev="benalex" type="update">All changes are in JIRA at http://opensource2.atlassian.com/projects/spring/secure/ReleaseNote.jspa?projectId=10040</action>
</release>
<release version="0.9.0" date="2005-11-11">
<action dev="benalex" type="update">All changes are in JIRA at http://opensource2.atlassian.com/projects/spring/secure/ReleaseNote.jspa?projectId=10040</action>
</release>
<release version="0.8.3" date="2005-05-12">
<action dev="benalex" type="fix">HttpSessionContextIntegrationFilter elegantly handles IOExceptions and ServletExceptions within filter chain (see http://opensource.atlassian.com/projects/spring/browse/SEC-20)</action>
</release>
<release version="0.8.1.1" date="2005-07-12">
<action dev="benalex" type="fix">HttpSessionContextIntegrationFilter elegantly handles IOExceptions and ServletExceptions within filter chain (see http://opensource.atlassian.com/projects/spring/browse/SEC-20)</action>
</release>
<release version="0.7.1" date="2005-07-12">
<action dev="benalex" type="fix">AbstractIntegrationFilter elegantly handles IOExceptions and ServletExceptions within filter chain (see http://opensource.atlassian.com/projects/spring/browse/SEC-20)</action>
</release>
<release version="0.8.2" date="2005-04-20">
<action dev="benalex" type="fix">Correct location of AuthenticationSimpleHttpInvokerRequestExecutor in clientContext.xml</action>
<action dev="benalex" type="fix">TokenBasedRememberMeServices changed to use long instead of int for tokenValiditySeconds (SPR-807)</action>
<action dev="benalex" type="fix">Handle null Authentication.getAuthorities() in AuthorizeTag</action>
<action dev="benalex" type="fix">PasswordDaoAuthenticationProvider no longer stores String against Authentication.setDetails()</action>
<action dev="benalex" type="update">Update commons-codec dependency to 1.3</action>
<action dev="raykrueger" type="update">AbstractProcessingFilter no longer has setters for failures, it uses the exceptionMappings property</action>
<action dev="benalex" type="update">Update to match Spring 1.2-RC2 official JAR dependencies</action>
<action dev="raykrueger" type="update">AuthenticationProcessingFilter now provides an obtainUsername method</action>
<action dev="luke_t" type="update">Correct PathBasedFilterInvocationDefinitionMap compatibility with Spring 1.2-RC2</action>
<action dev="luke_t" type="update">Refactoring to leverage Spring's Assert class and mocks where possible</action>
</release>
<release version="0.8.1" date="2005-03-22">
<action dev="luke_t" type="add">X509 (certificate-based) authentication support</action>
<action dev="benalex" type="update">UserDetails now advises locked accounts, with corresponding DaoAuthenticationProvider events and enforcement</action>
<action dev="benalex" type="update">ContextHolderAwareRequestWrapper methods return null if user is anonymous</action>
<action dev="benalex" type="update">AbstractBasicAclEntry improved compatibility with Hibernate</action>
<action dev="benalex" type="update">User now provides a more useful toString() method</action>
<action dev="benalex" type="update">Update to match Spring 1.1.5 official JAR dependencies (NB: now using Servlet 2.4 and related JSP/taglib JARs)</action>
<action dev="benalex" type="fix">SecurityEnforcementFilter caused NullPointerException when anonymous authentication used with BasicProcessingFilterEntryPoint</action>
<action dev="benalex" type="fix">FilterChainProxy now supports replacement of ServletRequest and ServetResponse by Filter beans</action>
<action dev="fbos" type="fix">Corrected Authz parsing of whitespace in GrantedAuthoritys</action>
<action dev="benalex" type="fix">TokenBasedRememberMeServices now respects expired users, expired credentials and disabled users</action>
<action dev="benalex" type="fix">HttpSessionContextIntegrationFilter now handles HttpSession invalidation without redirection</action>
<action dev="benalex" type="fix">StringSplitUtils.split() ignored delimiter argument</action>
<action dev="benalex" type="fix">DigestProcessingFilter now provides userCache getter and setter</action>
<action dev="benalex" type="fix">Contacts Sample made to work with UserDetails-based Principal</action>
<action dev="benalex" type="update">Documentation improvements</action>
<action dev="benalex" type="update">Test coverage improvements</action>
</release>
<release version="0.8.0" date="2005-03-03">
<action dev="benalex" type="add">Added Digest Authentication support (RFC 2617 and RFC 2069)</action>
<action dev="benalex" type="add">Added pluggable remember-me services</action>
<action dev="benalex" type="add">Added pluggable mechnism to prevent concurrent login sessions</action>
<action dev="benalex" type="add">FilterChainProxy added to significantly simplify web.xml configuration of Acegi Security</action>
<action dev="benalex" type="add">AuthenticationProcessingFilter now provides hook for extra credentials (eg postcodes)</action>
<action dev="benalex" type="add">New WebAuthenticationDetails class now used by processing filters for Authentication.setDetails()</action>
<action dev="benalex" type="add">Additional debug-level logging</action>
<action dev="benalex" type="add">Improved Tapestry support in AbstractProcessingFilter</action>
<action dev="benalex" type="update">Made ConfigAttributeDefinition and ConfigAttribute Serializable</action>
<action dev="benalex" type="update">User now accepts blank passwords (null passwords still rejected)</action>
<action dev="benalex" type="update">FilterToBeanProxy now searches hierarchical bean factories</action>
<action dev="benalex" type="update">User now accepted blank passwords (null passwords still rejected)</action>
<action dev="benalex" type="update">ContextHolderAwareRequestWrapper now provides a getUserPrincipal() method</action>
<action dev="benalex" type="update">HttpSessionIntegrationFilter no longer creates a HttpSession unnecessarily</action>
<action dev="benalex" type="update">FilterSecurityInterceptor now only executes once per request (improves performance with SiteMesh)</action>
<action dev="raykrueger" type="update">JaasAuthenticatinProvider now uses System.property "java.security.auth.login.config"</action>
<action dev="raykrueger" type="update">JaasAuthenticationCallbackHandler Authentication is passed to handle method setAuthentication removed</action>
<action dev="raykrueger" type="update">Added AuthenticationException to the AutenticationEntryPoint.commence method signature</action>
<action dev="raykrueger" type="update">Added AccessDeniedException to the SecurityEncorcementFilter.sendAccessDeniedError method signature</action>
<action dev="benalex" type="update">FilterToBeanProxy now addresses lifecycle mismatch (IoC container vs servlet container) issue</action>
<action dev="benalex" type="update">Significantly refactor "well-known location model" to authentication processing mechanism and HttpSessionContextIntegrationFilter model</action>
<action dev="benalex" type="fix">Correct issue with JdbcDaoImpl default SQL query not using consistent case sensitivity</action>
<action dev="benalex" type="fix">Improve Linux and non-Sun JDK (specifically IBM JDK) compatibility</action>
<action dev="benalex" type="fix">Log4j now included in generated WAR artifacts (fixes issue with Log4j listener)</action>
<action dev="benalex" type="fix">Correct NullPointerException in FilterInvocationDefinitionSource implementations</action>
</release>
<release version="0.7.0" date="2005-01-16">
<action dev="carlossg" type="add">Major CVS repository restructure to support Maven and eliminate libraries</action>
<action dev="benalex" type="update">Major improvements to Contacts sample application (now demos ACL security)</action>
<action dev="benalex" type="add">Added AfterInvocationManager to mutate objects return from invocations</action>
<action dev="benalex" type="add">Added BasicAclEntryAfterInvocationProvider to ACL evaluate returned Object</action>
<action dev="benalex" type="add">Added BasicAclEntryAfterInvocationCollectionFilteringProvider</action>
<action dev="benalex" type="add">Added security propagation during RMI invocations (from sandbox)</action>
<action dev="benalex" type="add">Added security propagation for Spring's HTTP invoker</action>
<action dev="benalex" type="add">Added BasicAclEntryVoter, which votes based on AclManager permissions</action>
<action dev="benalex" type="add">Added AspectJ support (especially useful for instance-level security)</action>
<action dev="benalex" type="add">Added MethodDefinitionSourceAdvisor for performance and autoproxying</action>
<action dev="benalex" type="add">Added MethodDefinitionMap querying of interfaces defined by secure objects</action>
<action dev="benalex" type="add">Added AuthenticationProcessingFilter.setDetails for use by subclasses</action>
<action dev="benalex" type="add">Added 403-causing exception to HttpSession via SecurityEnforcementFilter</action>
<action dev="benalex" type="add">Added net.sf.acegisecurity.intercept.event package</action>
<action dev="benalex" type="add">Added BasicAclExtendedDao interface and JdbcExtendedDaoImpl for ACL CRUD</action>
<action dev="benalex" type="add">Added additional remoting protocol demonstrations to Contacts sample</action>
<action dev="benalex" type="add">Added AbstractProcessingFilter property to always use defaultTargetUrl</action>
<action dev="benalex" type="add">Added ContextHolderAwareRequestWrapper to integrate with getRemoteUser()</action>
<action dev="benalex" type="add">Added attempted username to view if processed by AuthenticationProcessingFilter</action>
<action dev="benalex" type="add">Added UserDetails account and credentials expiration methods</action>
<action dev="benalex" type="add">Added exceptions and events to support new UserDetails methods</action>
<action dev="benalex" type="add">Added new exceptions to JBoss container adapter</action>
<action dev="benalex" type="update">Improved BasicAclProvider to only respond to specified ACL object requests</action>
<action dev="benalex" type="update">Refactored MethodDefinitionSource to work with Method, not MethodInvocation</action>
<action dev="benalex" type="update">Refactored AbstractFilterInvocationDefinitionSource to work with URL Strings alone</action>
<action dev="benalex" type="update">Refactored AbstractSecurityInterceptor to better support other AOP libraries</action>
<action dev="benalex" type="update">Improved performance of JBoss container adapter (see reference docs)</action>
<action dev="benalex" type="update">Made DaoAuthenticationProvider detect null in Authentication.principal</action>
<action dev="benalex" type="update">Improved JaasAuthenticationProvider startup error detection</action>
<action dev="benalex" type="update">Refactored EH-CACHE implementations to use Spring IoC defined caches instead</action>
<action dev="benalex" type="update">AbstractProcessingFilter now has various hook methods to assist subclasses</action>
<action dev="benalex" type="update">DaoAuthenticationProvider better detects AuthenticationDao interface violations</action>
<action dev="benalex" type="update">The User class has a new constructor (the old constructor is deprecated)</action>
<action dev="benalex" type="fix">Fixed ambiguous column references in JdbcDaoImpl default query</action>
<action dev="benalex" type="fix">Fixed AbstractProcessingFilter to use removeAttribute (JRun compatibility)</action>
<action dev="benalex" type="fix">Fixed GrantedAuthorityEffectiveAclResolver support of UserDetails principals</action>
<action dev="benalex" type="fix">Fixed HttpSessionIntegrationFilter "cannot commit to container" during logoff</action>
<action dev="benalex" type="update">Moved MethodSecurityInterceptor to ...intercept.method.aopalliance package</action>
<action dev="benalex" type="update">Documentation improvements</action>
<action dev="benalex" type="update">Test coverage improvements</action>
</release>
<release version="0.6.1" date="2004-09-24">
<action dev="benalex" type="update">Resolved to use http://apr.apache.org/versioning.html for future versioning</action>
<action dev="benalex" type="add">Added additional DaoAuthenticationProvider event when user not found</action>
<action dev="benalex" type="add">Added Authentication.getDetails() to DaoAuthenticationProvider response</action>
<action dev="benalex" type="add">Added DaoAuthenticationProvider.hideUserNotFoundExceptions (default=true)</action>
<action dev="benalex" type="add">Added PasswordAuthenticationProvider for password-validating DAOs (eg LDAP)</action>
<action dev="benalex" type="add">Added FilterToBeanProxy compatibility with ContextLoaderServlet (lazy inits)</action>
<action dev="benalex" type="add">Added convenience methods to ConfigAttributeDefinition</action>
<action dev="benalex" type="update">Improved sample applications' bean reference notation</action>
<action dev="benalex" type="update">Clarified contract for ObjectDefinitionSource.getAttributes(Object)</action>
<action dev="benalex" type="update">Extracted removeUserFromCache(String) to UserCache interface</action>
<action dev="benalex" type="update">Improved ConfigAttributeEditor so it trims preceding and trailing spaces</action>
<action dev="benalex" type="update">Refactored UsernamePasswordAuthenticationToken.getDetails() to Object</action>
<action dev="benalex" type="fix">Fixed MethodDefinitionAttributes to implement ObjectDefinitionSource change</action>
<action dev="benalex" type="fix">Fixed EH-CACHE-based caching implementation behaviour when cache exists</action>
<action dev="benalex" type="fix">Fixed Ant "release" target not including project.properties</action>
<action dev="benalex" type="fix">Fixed GrantedAuthorityEffectiveAclsResolver if null ACLs provided to method</action>
<action dev="benalex" type="update">Documentation improvements</action>
</release>
<release version="0.6" date="2004-08-08">
<action dev="benalex" type="add">Added domain object instance access control list (ACL) packages</action>
<action dev="benalex" type="add">Added feature so DaoAuthenticationProvider returns User in Authentication</action>
<action dev="benalex" type="add">Added AbstractIntegrationFilter.secureContext property for custom contexts</action>
<action dev="benalex" type="add">Added stack trace logging to SecurityEnforcementFilter</action>
<action dev="benalex" type="add">Added exception-specific target URLs to AbstractProcessingFilter</action>
<action dev="benalex" type="add">Added JdbcDaoImpl hook so subclasses can insert custom granted authorities</action>
<action dev="raykrueger" type="add">Added AuthenticationProvider that wraps JAAS login modules</action>
<action dev="fbos" type="add">Added support for EL expressions in the authz tag library</action>
<action dev="benalex" type="add">Added failed Authentication object to AuthenticationExceptions</action>
<action dev="benalex" type="add">Added signed JARs to all official release builds (see readme.txt)</action>
<action dev="benalex" type="add">Added remote client authentication validation package</action>
<action dev="benalex" type="add">Added protected sendAccessDeniedError method to SecurityEnforcementFilter</action>
<action dev="benalex" type="update">Updated Authentication to be serializable (Weblogic support)</action>
<action dev="benalex" type="update">Updated JAR to Spring 1.1 RC 1</action>
<action dev="benalex" type="update">Updated to Clover 1.3</action>
<action dev="benalex" type="update">Updated to HSQLDB version 1.7.2 Release Candidate 6D</action>
<action dev="benalex" type="update">Refactored User to net.sf.acegisecurity.UserDetails interface</action>
<action dev="benalex" type="update">Refactored CAS package to store UserDetails in CasAuthenticationToken</action>
<action dev="benalex" type="update">Improved organisation of DaoAuthenticationProvider to facilitate subclassing</action>
<action dev="benalex" type="update">Improved test coverage (now 98.3%)</action>
<action dev="benalex" type="update">Improved JDBC-based tests to use in-memory database rather than filesystem</action>
<action dev="benalex" type="update">Fixed Linux compatibility issues (directory case sensitivity etc)</action>
<action dev="benalex" type="update">Fixed AbstractProcessingFilter to handle servlet spec container differences</action>
<action dev="benalex" type="update">Fixed AbstractIntegrationFilter to resolve a Weblogic compatibility issue</action>
<action dev="benalex" type="fix">Fixed CasAuthenticationToken if proxy granting ticket callback not requested</action>
<action dev="benalex" type="fix">Fixed EH-CACHE handling on web context refresh</action>
<action dev="benalex" type="update">Documentation improvements</action>
</release>
<release version="0.5.1" date="2004-06-05">
<action dev="benalex" type="add">Added samples/quick-start</action>
<action dev="benalex" type="add">Added NullRunAsManager and made default for AbstractSecurityInterceptor</action>
<action dev="benalex" type="add">Added event notification (see net.sf.acegisecurity.providers.dao.event)</action>
<action dev="benalex" type="update">Updated JAR to Spring 1.0.2</action>
<action dev="benalex" type="update">Updated JAR to Commons Attributes CVS snapshot from Spring 1.0.2 release</action>
<action dev="benalex" type="update">Updated GrantedAuthorityImpl to be serializable (JBoss support)</action>
<action dev="benalex" type="update">Updated Authentication interface to present extra details for a request</action>
<action dev="benalex" type="update">Updated Authentication interface to subclass java.security.Principal</action>
<action dev="benalex" type="update">Refactored DaoAuthenticationProvider caching (refer to reference docs)</action>
<action dev="benalex" type="update">Improved HttpSessionIntegrationFilter to manage additional attributes</action>
<action dev="benalex" type="update">Improved URL encoding during redirects</action>
<action dev="benalex" type="fix">Fixed issue with hot deploy of EhCacheBasedTicketCache (used with CAS)</action>
<action dev="fbos" type="fix">Fixed issue with NullPointerExceptions in taglib</action>
<action dev="benalex" type="update">Removed DaoAuthenticationToken and session-based caching</action>
<action dev="benalex" type="update">Documentation improvements</action>
<action dev="benalex" type="update">Upgrade Note: DaoAuthenticationProvider no longer has a "key" property</action>
</release>
<release version="0.5" date="2004-04-28">
<action dev="benalex" type="add">Added single sign on support via Yale Central Authentication Service (CAS)</action>
<action dev="benalex" type="add">Added full support for HTTP Basic Authentication</action>
<action dev="benalex" type="add">Added caching for DaoAuthenticationProvider successful authentications</action>
<action dev="benalex" type="add">Added Burlap and Hessian remoting to Contacts sample application</action>
<action dev="colins" type="add">Added pluggable password encoders including plaintext, SHA and MD5</action>
<action dev="benalex" type="add">Added pluggable salt sources to enhance security of hashed passwords</action>
<action dev="benalex" type="add">Added FilterToBeanProxy to obtain filters from Spring application context</action>
<action dev="colins" type="add">Added support for prepending strings to roles created by JdbcDaoImpl</action>
<action dev="colins" type="add">Added support for user definition of SQL statements used by JdbcDaoImpl</action>
<action dev="colins" type="add">Added definable prefixes to avoid expectation of "ROLE_" GrantedAuthoritys</action>
<action dev="benalex" type="add">Added pluggable AuthenticationEntryPoints to SecurityEnforcementFilter</action>
<action dev="benalex" type="add">Added Apache Ant path syntax support to SecurityEnforcementFilter</action>
<action dev="benalex" type="add">Added filter to automate web channel requirements (eg HTTPS redirection)</action>
<action dev="benalex" type="update">Updated JAR to Spring 1.0.1</action>
<action dev="benalex" type="update">Updated several classes to use absolute (not relative) redirection URLs</action>
<action dev="benalex" type="update">Refactored filters to use Spring application context lifecycle support</action>
<action dev="benalex" type="update">Improved constructor detection of nulls in User and other key objects</action>
<action dev="benalex" type="fix">Fixed FilterInvocation.getRequestUrl() to also include getPathInfo()</action>
<action dev="benalex" type="fix">Fixed Contacts sample application <A></A> tags</action>
<action dev="benalex" type="update">Established acegisecurity-developer mailing list</action>
<action dev="benalex" type="update">Documentation improvements</action>
</release>
<release version="0.4" date="2004-04-03">
<action dev="benalex" type="add">Added HTTP session authentication as an alternative to container adapters</action>
<action dev="benalex" type="add">Added HTTP request security interceptor (offers considerable flexibility)</action>
<action dev="fbos" type="add">Added security taglib</action>
<action dev="benalex" type="add">Added Clover test coverage instrumentation (currently 97.2%)</action>
<action dev="benalex" type="add">Added support for Catalina (Tomcat) 4.1.30 to in-container integration tests</action>
<action dev="benalex" type="add">Added HTML test and summary reporting to in-container integration tests</action>
<action dev="benalex" type="update">Updated JARs to Spring Framework release 1.0, with associated AOP changes</action>
<action dev="benalex" type="update">Updated to Apache License version 2.0</action>
<action dev="benalex" type="update">Updated copyright with permission of past contributors</action>
<action dev="benalex" type="update">Refactored unit tests to use mock objects and focus on a single class each</action>
<action dev="benalex" type="update">Refactored many classes to enable insertion of mock objects during testing</action>
<action dev="benalex" type="update">Refactored core classes to ease support of new secure object types</action>
<action dev="benalex" type="update">Changed package layout to better describe the role of contained items</action>
<action dev="benalex" type="update">Changed the extractor to extract additional classes from JBoss and Catalina</action>
<action dev="benalex" type="update">Changed Jetty container adapter configuration (see reference documentation)</action>
<action dev="benalex" type="update">Improved AutoIntegrationFilter handling of deployments without JBoss JARs</action>
<action dev="benalex" type="fix">Fixed case handling support in data access object authentication provider</action>
<action dev="benalex" type="update">Documentation improvements</action>
</release>
<release version="0.3" date="2004-03-18">
<action dev="benalex" type="add">Added "in container" unit test system for container adapters and sample app</action>
<action dev="benalex" type="add">Added library extractor tool to reduce the "with deps" ZIP release sizes</action>
<action dev="benalex" type="add">Added unit test to the attributes sample</action>
<action dev="benalex" type="add">Added Jalopy source formatting</action>
<action dev="benalex" type="update">Modified all files to use net.sf.acegisecurity namespace</action>
<action dev="benalex" type="update">Renamed springsecurity.xml to acegisecurity.xml for consistency</action>
<action dev="benalex" type="update">Reduced length of ZIP and JAR filenames</action>
<action dev="benalex" type="update">Clarified licenses and sources for all included libraries</action>
<action dev="benalex" type="update">Updated documentation to reflect new file and package names</action>
<action dev="benalex" type="update">Setup Sourceforge.net project and added to CVS etc</action>
</release>
<release version="0.2" date="2004-03-10">
<action dev="benalex" type="add">Added Commons Attributes support and sample (thanks to Cameron Braid)</action>
<action dev="benalex" type="add">Added JBoss container adapter</action>
<action dev="benalex" type="add">Added Resin container adapter</action>
<action dev="benalex" type="add">Added JDBC DAO authentication provider</action>
<action dev="benalex" type="add">Added several filter implementations for container adapter integration</action>
<action dev="benalex" type="add">Added SecurityInterceptor startup time validation of ConfigAttributes</action>
<action dev="benalex" type="add">Added more unit tests</action>
<action dev="benalex" type="update">Refactored ConfigAttribute to interface and added concrete implementation</action>
<action dev="benalex" type="update">Enhanced diagnostics information provided by sample application debug.jsp</action>
<action dev="benalex" type="update">Modified sample application for wider container portability (Resin, JBoss)</action>
<action dev="benalex" type="fix">Fixed switch block in voting decision manager implementations</action>
<action dev="benalex" type="update">Removed Spring MVC interceptor for container adapter integration</action>
<action dev="benalex" type="update">Documentation improvements</action>
</release>
<release version="0.1" date="2004-03-03">
<action dev="benalex" type="add">Initial public release</action>
</release>
</body>
</document>

View File

@ -1,71 +0,0 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<document>
<properties>
<title>Spring Security Downloads</title>
</properties>
<body>
<section name="Spring Security Downloads">
<p>
If you wish to try out this project, you are probably
looking for the
<strong>spring-security-xx.zip</strong>
file, which contains all of the officially released
JARs, a copy of all documentation, and two WAR
artifacts. The two WAR artifacts are from the Contacts
Sample and the Tutorial Sample application. The Tutorial
Sample consists of a "bare bones" configuration that
will get you up and running quickly, whereas the
Contacts Sample illustrates more advanced features.
</p>
<p>
The spring-security-xx-src.zip is intended for use with
IDEs. It does not contain the files needed to compile
Spring Security. It also does not contain the sources to
the sample applications. If you need any of these files,
please download from SVN.
</p>
<subsection name="Official Releases">
<p>
The official release ZIP files are available from
the
<a
href="http://sourceforge.net/project/showfiles.php?group_id=104215">
Sourceforge File Release System
</a>
.
</p>
</subsection>
<subsection name="Maven Dependencies">
<p>
The Spring Security JARs are also available via the
<a
href="http://repo1.maven.org/maven2/org/acegisecurity">
Central Maven Repository
</a>
.
</p>
</subsection>
<subsection name="Building From Source">
<p>
Detailed instructions on downloading from CVS and
building from source are provided on the
<a href="building.html">Building with Maven</a>
page.
</p>
</subsection>
<subsection name="Nightly Builds">
<p>
If you don't wish to access SVN directly, we provide
<a
href="http://acegisecurity.sourceforge.net/nightly/">
nightly snaphot builds
</a>
for your convenience. These should contain both source and binary
jars. The archive files are labelled with both the build date and the
subversion revision number used for the build.
</p>
</subsection>
</section>
</body>
</document>

View File

@ -1,288 +0,0 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<document>
<properties>
<title>Frequently Asked Questions (FAQ) on Acegi Security</title>
</properties>
<body>
<section name="Frequently Asked Questions">
<subsection name="What is Acegi Security?">
<p>Acegi Security is an open source project that provides comprehensive authentication
and authorisation services for enterprise applications based on
<a href="http://www.springframework.org">The Spring Framework</a>.
Acegi Security can authenticate using a variety of pluggable providers, and
can authorise both web requests and method invocations.
Acegi Security provides an integrated security approach across
these various targets, and also offers access control list (ACL) capabilities to
enable individual domain object instances to be secured. At an implementation
level, Acegi Security is managed through Spring's inversion of control and
lifecycle services, and actually enforces security using interception through
servlet Filters and Java AOP frameworks. In terms of AOP framework support, Acegi
Security currently supports AOP Alliance (which is what the
Spring IoC container uses internally) and AspectJ, although additional frameworks
can be easily supported.</p>
</subsection>
<subsection name="Why not just use web.xml security?">
<p>Let's assume you're developing an enterprise application based on Spring.
There are four security concerns you typically need to address: authentication,
web request security, service layer security (ie your methods that implement
business logic), and domain object instance security (ie different domain objects
have different permissions). With these typical requirements in mind:
<ol>
<li><b>Authentication</b>: The servlet specification provides an approach
to authentication. However, you will need to configure the container
to perform authentication which typically requires editing of
container-specific "realm" settings. This makes a non-portable
configuration, and if you need to write an actual Java class to implement
the container's authentication interface, it becomes even more non-portable.
With Acegi Security you achieve complete portability - right down to the
WAR level. Also, Acegi Security offers a choice of production-proven
authentication providers and mechanisms, meaning you can switch your
authentication approaches at deployment time. This is particularly
valuable for software vendors writing products that need to work in
an unknown target environment.<br></br><br></br></li>
<li><b>Web request security:</b> The servlet specification provides an
approach to secure your request URIs. However, these URIs can only be
expressed in the servlet specification's own limited URI path format.
Acegi Security provides a far more comprehensive approach. For instance,
you can use Ant paths or regular expressions, you can consider parts of the
URI other than simply the requested page (eg you can consider HTTP GET
parameters), and you can implement your own runtime source of configuration
data. This means your web request security can be dynamically changed during
the actual execution of your webapp.<br></br><br></br></li>
<li><b>Service layer and domain object security:</b> The absence of support
in the servlet specification for services layer security or domain object
instance security represent serious limitations for multi-tiered
applications. Typically developers either ignore these requirements, or
implement security logic within their MVC controller code (or even worse,
inside the views). There are serious disadvantages with this approach:<br></br><br></br>
<ol>
<li><i>Separation of concerns:</i> Authorization is a
crosscutting concern and should be implemented as such.
MVC controllers or views implementing authorization code
makes it more difficult to test both the controller and
authorization logic, more difficult to debug, and will
often lead to code duplication.</li>
<li><i>Support for rich clients and web services:</i> If an
additional client type must ultimately be supported, any
authorization code embedded within the web layer is
non-reusable. It should be considered that Spring remoting
exporters only export service layer beans (not MVC
controllers). As such authorization logic needs to be
located in the services layer to support a multitude of
client types.</li>
<li><i>Layering issues:</i> An MVC controller or view is simply
the incorrect architectural layer to implement authorization
decisions concerning services layer methods or domain object
instances. Whilst the Principal may be passed to the services
layer to enable it to make the authorization decision, doing
so would introduce an additional argument on every services
layer method. A more elegant approach is to use a ThreadLocal
to hold the Principal, although this would likely increase
development time to a point where it would become more
economical (on a cost-benefit basis) to simply use a dedicated
security framework.</li>
<li><i>Authorisation code quality:</i> It is often said of web
frameworks that they "make it easier to do the right things,
and harder to do the wrong things". Security frameworks are
the same, because they are designed in an abstract manner for
a wide range of purposes. Writing your own authorization code
from scratch does not provide the "design check" a framework
would offer, and in-house authorization code will typically
lack the improvements that emerge from widespread deployment,
peer review and new versions.
</li></ol>
</li>
</ol>
For simple applications, servlet specification security may just be enough.
Although when considered within the context of web container portability,
configuration requirements, limited web request security flexibility, and
non-existent services layer and domain object instance security, it becomes
clear why developers often look to alternative solutions.
</p></subsection>
<subsection name="How do you pronounce &quot;Acegi&quot;?">
<p><i>Ah-see-gee</i>. Said quickly, without emphasis on any part.
Acegi isn't an acronym, name of a Greek God or anything similarly
impressive - it's just letters #1, #3, #5, #7 and #9 of the alphabet.</p>
</subsection>
<subsection name="Is it called &quot;Acegi&quot; or &quot;Acegi Security&quot;?">
<p>It's official name is <i>Spring Security</i>,
although we're happy for it to be abbreviated to
<i>Acegi Security</i>. Please don't just call it <i>Acegi</i>, though,
as that gets confused with the name of the company that maintains Acegi
Security.</p></subsection>
<subsection name="What catches 80% of users reporting problems?">
<p>80% of support questions are because people have not defined
the necessary filters in <code>web.xml</code>, or the filters are being
mapped in the incorrect order. Check the
<a href="reference.html">Reference Guide</a>, which
has a specific section on filter ordering.</p></subsection>
<subsection name="I&apos;m sure my filters are ordered correctly. What else could be wrong?">
<p>The next most common source of problems stem from custom
<code>AuthenticationDao</code> implementations that simply don't properly
implement the interface contract. For example, they return <code>null</code> instead
of the user not found exception, or fail to add in the
<code>GrantedAuthority[]</code>s. Whilst <code>DaoAuthenticationProvider</code>
does its best to check the <code>AuthenticationDao</code> returns a valid
<code>UserDetails</code>, we suggest you write the
<code>UserDetails</code> object to the log and check it looks correct.</p></subsection>
<subsection name="Common Problem #1: My application goes into an &quot;endless loop&quot; when I try to login, what&apos;s going on?">
<p>A common user problem with infinite loop and redirecting to the login page
is caused by accidently configuring the login page as a "secured" resource.
Generally make sure you mark your login page as requiring ROLE_ANONYMOUS.
</p></subsection>
<subsection name="Common Problem #2: My application pages don&apos;t seem to be protected.">
<p>If you are securing web resources and they dont seem to be matched in the URL patterns,
check the objectDefinitionSource in the FilterSecurityInterceptor.
If you are using the <tt>CONVERT_URL_TO_LOWERCASE_BEFORE_COMPARISON</tt> setting,
then the URL patterns configured MUST be in lowercase.
</p><p>
For example, making a request ending in <tt>/someAction.do</tt> will need
to be configured as: <tt>/someaction.do</tt> (Note the case).
<pre>
&lt;property name="objectDefinitionSource"&gt;
&lt;value&gt;
CONVERT_URL_TO_LOWERCASE_BEFORE_COMPARISON
PATTERN_TYPE_APACHE_ANT
/index.jsp=ROLE_ANONYMOUS,ROLE_USER
/someaction.do=ROLE_USER
&lt;value&gt;
&lt;/property&gt;
</pre>
</p></subsection>
<subsection name="Common Problem #3: How do I disable a user after a number of failed logins?">
<p>A common user requirement is to disable / lock an account after a number of failed login attempts.
Acegi itself does not provide anything "out of the box", however in your application you can implement
and register an <tt>org.springframework.context.ApplicationListener</tt>. Inside your application
event listener you can then check for an instanceof the particular <tt>AuthenticationFailureEvent</tt>
and then call your application user management interface to update the user details.
</p><p>
For example:
<pre>
public void onApplicationEvent(ApplicationEvent event) {
// check failed event
if(event instanceof AuthenticationFailurePasswordEvent){
// call user management interface to increment failed login attempts, etc.
. . .
}
}
</pre>
</p></subsection>
<subsection name="Common Problem #4: I am changing my password using a web controller and DAO, why is my password still not being refreshed?">
<p>There are three things you must do to make a user password change take affect:
<ul>
<li> Change the password using your authentication DAO</li>
<li> Remove the user from the User Cache (i.e. if you have a cache configured) </li>
<li> Update the <tt>SecurityContextHolder</tt> to include the new <tt>Authentication</tt> object and password</li>
</ul>
</p>
</subsection>
<subsection name="I need some help. What files should I post?">
<p>The most important things to post with any support requests on the
<a href="http://forum.springframework.org">Spring Forums</a> are your
<code>web.xml</code>, <code>applicationContext.xml</code> (or whichever
XML loads the security-related beans) as well as any custom
<code>AuthenticationDao</code> you might be using. For really odd problems,
also switch on debug-level logging and include the resulting log.</p></subsection>
<subsection name="How do I switch on debug-level logging?">
<p>Acegi Security uses Commons Logging, just as Spring does. So you use the
same approach as you'd use for Spring. Most people output to Log4J, so
the following <code>log4j.properties</code> would work:</p><source>
log4j.rootCategory=WARN, stdout
log4j.appender.stdout=org.apache.log4j.ConsoleAppender
log4j.appender.stdout.layout=org.apache.log4j.PatternLayout
log4j.appender.stdout.layout.ConversionPattern=%d %p %c - %m%n
log4j.category.net.sf.acegisecurity=DEBUG
</source></subsection>
<subsection name="How do I store custom properties, like a user&apos;s email address?">
<p>In most cases write an <code>AuthenticationDao</code> which returns
a subclass of <code>User</code>. Alternatively, write your own
<code>UserDetails</code> implementation from scratch and return that.</p></subsection>
<subsection name="Why doesn&apos;t Acegi Security use JAAS?">
<p>Acegi Security targets <i>enterprise applications</i>, which are typically
multi-user, data-oriented applications that are important to
the core business. Acegi Security was designed to provide a portable and effective
security framework for this target application type. It was not designed for securing
limited privilege runtime environments, such as web browser applets.</p>
<p>We did consider JAAS when designing Acegi Security, but it simply
wasn't suitable for our purpose. We needed to avoid complex JRE configurations,
we needed container portability, and we wanted maximum leveraging of the Spring IoC
container. Particularly as limited privilege runtime environments were not
an actual requirement, this lead to the natural design of Acegi Security as
it exists today.</p><p>Acegi Security already provides some JAAS integration. It can today authenticate
via delegation to a JAAS login module. This means it offers the same level of JAAS
integration as many web containers. Indeed the container adapter model supported by
Acegi Security allows Acegi Security and container-managed security to happily
co-exist and benefit from each other. Any debate about Acegi Security and JAAS
should therefore centre on the authorisation issue. An evaluation of major
containers and security frameworks would reveal that Acegi Security is by no
means unusual in not using JAAS for authorisation.</p>
<p>There are many examples of open source applications being preferred to
official standards. A few that come to mind in the Java community include
using Spring managed POJOs (rather than EJBs), Hibernate (instead of entity beans),
Log4J (instead of JDK logging), Tapestry (instead of JSF), and Velocity/FreeMarker
(instead of JSP). It's important to recognise that many open source projects do
develop into de facto standards, and in doing so play a legitimate and beneficial
role in professional software development.</p></subsection>
<subsection name="Do you welcome contributions?">
<p>Yes. If you've written something and it works well, please feel free to share it.
Simply email the contribution to the
<a href="mail-lists.html">acegisecurity-developers</a> list. If you haven't yet
written the contribution, we encourage you to send your thoughts to the same
list so that you can receive some initial design feedback.</p>
<p>For a contribution to be used, it must have appropriate unit test coverage and
detailed JavaDocs. It will ideally have some comments for the Reference Guide
as well (this can be sent in word processor or HTML format if desired). This
helps ensure the contribution maintains the same quality as the remainder of
the project.</p><p>We also welcome documentation improvements, unit tests, illustrations,
people supporting the user community (especially on the forums), design ideas,
articles, blog entries, presentations and alike. If you're looking for something
to do, you can always email the
<a href="mail-lists.html">acegisecurity-developers</a> list and we'll be
pleased to suggest something. :-)</p></subsection>
</section>
</body>
</document>

View File

@ -1,103 +0,0 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<document><properties><title>Project Policies and Procedures</title></properties><body><section name="Project Policies and Procedures Version 1.0"><p>The following policies and procedures are intended to ensure that Spring Security will
continue to achieve its project objectives and support the community in the context of an
expanding development team.
</p><p>
The following was unanimously supported by the community supporting following
<a href="http://www.mail-archive.com/acegisecurity-developer%40lists.sourceforge.net/msg01174.html">discussion</a>
on acegisecurity-developer. The policies and procedures below represent version 1.0
and are effective 1 August 2005.
<ul type="1">
<li>
This project uses <a href="http://opensource.atlassian.com/projects/spring/secure/BrowseProject.jspa?id=10040">JIRA</a>. Please log a task in JIRA for any changes you make to SVN, with the exception of very minor changes that users are unlikely to ever be interested in searching for and/or the change affects code that has never been in an officially released version of the project (eg ongoing changes to a new feature in SVN HEAD that hasn't been released previously).<br></br><br></br>
</li>
<li>
Any users running from SVN HEAD are warmly encouraged to <a href="http://lists.sourceforge.net/mailman/listinfo/acegisecurity-cvs">join acegisecurity-cvs</a> so that they can keep an eye on commit comments. Developers are encouraged to join acegisecurity-cvs and read the commit comments. If anyone has a concern with any commit, please raise it on <a href="http://lists.sourceforge.net/mailman/listinfo/acegisecurity-developer">acegisecurity-developer</a> so that the broader community can participate (not acegisecurity-cvs). Alternatively, contact the author of the change directly if you think that would be more appropriate or diplomatic.<br></br><br></br>
</li>
<li>
Please make your commit comments informative, yet not too detailed. Detailed comments are ideally placed in the JIRA task. In the case of a contribution by a non-developer, please use the SVN commits to reflect who provided the contribution and add that person's name to /pom.xml in the contributors section. If the contributors section does not list the name of someone who has contributed accepted code, please add them or let me know so that I can do so.<br></br><br></br>
</li>
<li>
If you add a major new feature, please announce it on acegisecurity-developer. That way people using the project have an idea of what is coming up in the next release, and any implementation-specific comments can be received prior to the first release when users will start expecting some degree of consistency and stability. It also encourages people to try out your new feature.<br></br><br></br>
</li>
<li>
Please make sure /docs/xdocs/changes.xml has a reference to JIRA for the upcoming release version. You don't need to add the name of contributors to /doc/xdocs/changes.xml, as acknowledgement is already provided via /pom.xml, source code @author tags, the SVN commit message, and typically a JIRA task.<br></br><br></br>
</li>
<li>
Please edit /docs/xdocs/upgrade/upgrade-xx-yy.html if you make a change that is significant and you think users who are upgrading should be aware of it. Equally, users are encouraged to consult the upgrade-xx-yy.html file before they deploy subsequent official release JARs.<br></br><br></br>
</li>
<li>
Please use Jalopy with the /jalopy.xml file to format your Java code before checkin. This keeps our code consistent and ensures the license message is correct. There are plugins for all major IDEs.<br></br><br></br>
</li>
<li>
The /sandbox can be used to obtain feedback from fellow developers and the community about your code, general approach or new ideas. If you have SVN rights, please use /sandbox instead of emailing ZIP files to other developers for feedback. The community should understand that code in the sandbox is unsupported, subject to refactoring, may not have any unit tests, and may be removed at any time. The /sandbox will never be included in official release ZIPs. It's a "scratching pad" only.<br></br><br></br>
</li>
<li>
Unit tests are important to any security project, and we have a good history of high coverage. You can view the <a href="http://acegisecurity.sourceforge.net/multiproject/acegi-security/clover/index.html">latest coverage report</a> online (rebuilt every 24 hours). Please keep an eye on coverage and don't hesitate to add more unit tests. Please do not check code into /core unless it has at least an exercising unit test - use the /sandbox instead.<br></br><br></br>
</li>
<li>
Never check in code if the unit tests fail. This means, at minimum, successfully running "mvn test" from /core. Always name your unit test classes so they end in "*Tests" - this ensures that Maven picks them up. If there is code in SVN which you didn't write and it is breaking the unit tests, please correct it yourself - don't leave SVN "broken" whilst waiting for the responsible developer to address it (the delay causes confusing and long-running threads on the list and forum). You can always rollback to the previous working version if in doubt of how the class works (just remember to comment the commit appropriately and let the author know).<br></br><br></br>
</li>
<li>
Please update the reference guide and JavaDocs for any new major features. The JavaDocs should always be correct. The reference guide may be kept updated with less rigor, although please briefly discuss any major new features. <a href="http://www.xmlmind.com/xmleditor/">XMLmind</a> can be used if you don't have a DocBook editor.<br></br><br></br>
</li>
<li>
Developers please keep an eye on the <a href="http://forum.springframework.org">Spring Security forum</a>. It's a very active forum, and it takes a lot of work if not shared around. Please don't hesitate to reply to users - I try to read every thread and correct/confirm the situation if someone mentions they're unsure. I also will generally send developers an email if there's a question I can't answer as I didn't write the code.<br></br><br></br>
</li>
<li>
In the future, I will put to vote any proposed new developers. New developers will be firstly encouraged to attach patches to JIRA tasks to illustrate their understanding of the project, or, if they're long-time users, they might be given access without this JIRA stage if they're undertaking a major new feature.<br></br><br></br>
</li>
<li>
Developers should be subscribed to acegisecurity-developer. Obviously it would take significant time to read every thread, but reading the high priority messages (as indicated by the subject line) is needed to ensure we all have a way of communicating.<br></br><br></br>
</li>
<li>
Please do not hesitate to assign yourself any JIRA task that is unassigned, or assigned to me and not in the "In Progress" status. Also feel free to approach fellow developers to volunteer to work on tasks they might be assigned but haven't started.<br></br><br></br>
</li>
<li>
No code in SVN is "sacred". If you have a good idea or refactoring for an area of code that someone else wrote, raise it on acegisecurity-developer or contact the author directly. Please don't commit changes to such code unless it is a unit test failure correction, or you've firstly raised it on the acegisecurity-developer list or directly with the author.<br></br><br></br>
</li>
<li>
People's priorities are ever-changing, and we're all short on time. For this reason it's perfectly understandable that over time developers will move on to other things. This is not a negative reflection in any way - just part of any long-term project. If a developer no longer has the time or inclination to participate in the project , please send an email to acegisecurity-developer or myself. I will remove the SVN rights and reassign any JIRA tasks. Importantly, this helps find a new maintainer of the former developer's code (or, in very extreme cases, their code might be relocated to the sandbox or removed).<br></br><br></br>
</li>
<li>
Use CDATA inside XML files for multi-line properties. There is no tab/space policy for XML files, although try to maintain whatever the file is already using. The tab/space policy for Java files is managed by Jalopy.<br></br><br></br>
</li>
<li>
Keep the warm community spirit. The Spring community is a nice place to be - especially compared with some of the other open source communities out there where people are abused, ignored, insulted or excluded. No policy or procedure (including those above) should ever compromise operating in a considerate and diplomatic manner that respects the dignity of each individual member of the community. If in doubt, please contact me directly first. If I am ever guilty of this, please let me know and I will correct myself.<br></br><br></br>
</li>
</ul>
</p><p>Thanks for your help in connection with the above. If you have any suggestions for improving these
policies and procedures, please use the acegisecurity-developer list to raise them.
</p><p>
Ben Alex<br></br>
Project Admin
</p><p>
$Id$
</p></section></body></document>

View File

@ -1,41 +0,0 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<document><properties><title>Products Using Spring Security</title></properties><body><section name="Products Using Spring (Acegi) Security"><p>Many open source and commercial products either use Acegi Security or at least
support it. Following is a partial list of such products. If you've integrated Spring
Security with some other product, please let us know (preferably with a URL
to some page explaining the integration/use)...
</p><subsection name="Out-Of-the-Box Supported by Spring Security"><ul>
<li><b><a href="http://springframework.org/">Spring Framework</a></b>: J2EE abstraction framework.<br></br><br></br></li>
<li><b><a href="http://eclipse.org/aspectj/">AspectJ</a></b>: AOP framework.<br></br><br></br></li>
<li><b><a href="http://jcaptcha.sourceforge.net/">JCaptcha</a></b>: Detects human users.<br></br><br></br></li>
<li><b><a href="http://www.ja-sig.org/products/cas/">JA-SIG CAS</a></b>: Single Sign On system.<br></br><br></br></li>
<li><b><a href="http://www3.ca.com/Solutions/Product.asp?ID=5262">SiteMinder</a></b>: Single Sign On system.<br></br><br></br></li>
</ul></subsection><subsection name="Open Source Projects"><ul>
<li><b><a href="http://www.josso.org/">JOSSO</a></b>: Open source Single Sign On system. <a href="http://www.josso.org/confluence/x/TwAI">Integration details</a>.<br></br><br></br></li>
<li><b><a href="http://www.opennms.org/">OpenNMS</a></b>: An open source network management platform <a href="http://www.opennms.org/index.php/Acegi_Security_and_LDAP">Integration details</a>.<br></br><br></br></li>
<li><b><a href="http://appfuse.org/">AppFuse</a></b>: Helps jump-start application development. <a href="http://raibledesigns.com/wiki/Wiki.jsp?page=AppFuseSecurity">Integration details</a>.<br></br><br></br></li>
<li><b><a href="http://www.andromda.org">AndroMDA</a></b>: Code generation framework that uses model driven architecture (MDA). <a href="http://team.andromda.org/docs/andromda-spring-cartridge/howto8.html">Integration details</a>.<br></br><br></br></li>
<li><b><a href="http://mule.codehaus.org/">Mule</a></b>: Enterprise service bus (ESB) messaging framework. <a href="http://mule.codehaus.org/Acegi+Security">Integration details</a>.<br></br><br></br></li>
<li><b><a href="http://rollerweblogger.org">Roller</a></b>: Blog server. <a href="http://rollerweblogger.org/wiki/Wiki.jsp?page=Proposal_AcegiSecurity">Integration details</a>.<br></br><br></br></li>
<li><b><a href="http://getahead.ltd.uk/dwr/">DWR</a></b>: AJAX tool. <a href="http://getahead.ltd.uk/dwr/security">Integration details</a>.<br></br><br></br></li>
<li><b><a href="http://sourceforge.net/projects/oaj">OAJ (OpenAccountingJ)</a></b>: Replaces OpenAccounting PHP.<br></br><br></br></li>
<li><b><a href="http://oness.sourceforge.net/">ONESS</a></b>: Sample web application.<br></br><br></br></li>
<li><b><a href="http://sourceforge.net/projects/hispacta">HISPACTA</a></b>: Sample web application.<br></br><br></br></li>
<li><b><a href="https://atleap.dev.java.net/">Blandware AtLeap</a></b>: Multilingal free Java CMS.<br></br><br></br></li>
<li><b><a href="http://photostructure.com/">PhotoStructure</a></b>: A photo management solution.<br></br><br></br></li>
<li><b><a href="http://app.ess.ch/tudu/welcome.action">Tudu Lists</a></b>: AJAX and RSS powered to-do list manager.<br></br><br></br></li>
<li><b><a href="http://trails.dev.java.net/">Trails</a></b>: Native Java Ruby-On-Rails-like framework. <a href="http://os.inspiring.nl/confluence/display/trails/Using+Security">Integration details</a>.<br></br><br></br></li>
<li><b><a href="http://grails.codehaus.org/">Grails</a></b>: Native Java and Groovy Ruby-On-Rails-like framework. <a href="http://bbweblog.kevinhooke.com/BBWeblog/viewPost.do?entryID=803&amp;instanceID=1&amp;categoryID=111&amp;action=detail">Integration details</a>.<br></br><br></br></li>
<li><b><a href="http://tapestry.apache.org/">Tapestry</a></b>: The original Java event-driven web framework. <a href="http://www.carmanconsulting.com/tapestry-acegi">Integration details</a>.<br></br><br></br></li>
<li><b><a href="http://jtrac.info/">JTrac</a></b>: A Java-based issue management system. <a href="http://jtrac.info/doc/html/faq.html">Integration details</a>.<br></br><br></br></li>
<li><b><a href="http://plazma.sourceforge.net/">Plazma</a></b>: Swing-based ERP and CRM system for SMEs.<br></br><br></br></li>
<li><b><a href="http://www.jasypt.org/">Jasypt</a></b>: Java encryption project. <a href="http://www.jasypt.org/faq.html#i-am-already-using-spring-security-for-encrypting-passwords">Integration details</a>.<br></br><br></br></li>
</ul></subsection><subsection name="Commercial Products and Deployments"><ul>
<li><b><a href="http://www.atlassian.com/software/crowd/">Atlassian Crowd</a></b>: Single Sign On system. <a href="http://confluence.atlassian.com/display/CROWD/3.2.09+Integrating+Crowd+with+Acegi+Security">Integration details</a>.<br></br><br></br></li>
<li>A global financial institution uses Spring Security's SiteMinder integration in a physical security management application.<br></br><br></br></li>
<li><a href="http://www.elasticpath.com/ecommerce/architecture/soa.jsp">Elastic Path</a> uses Spring Security for security.<br></br><br></br></li>
<li>A central bank that uses Spring Security for many of its internal applications with the CAS integration.<br></br><br></br></li>
<li>Several Australian Government departments use Spring Security for securing SOAP-based web services and web applications.<br></br><br></br></li>
<li>Enterprise Systems and Services at Rutgers University uses Spring Security in conjunction with JA-SIG Central Authentication Service to provide authentication and authorization capabilities to its applications including those used by staff and students as well as those utilized by web services.<br></br><br></br></li>
<li>Plus many more... ;-)<br></br><br></br></li>
</ul></subsection></section></body></document>

View File

@ -1,50 +0,0 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<document><properties><title>Acegi Security Use Without Spring</title></properties><body><section name="Acegi Security Use Without Spring"><subsection name="Introduction"><p>Sometimes we get asked can Acegi Security be used without Spring.
This page provides a detailed answer.</p></subsection><subsection name="History"><p>Acegi Security started out as a method interceptor for Spring IoC container
managed beans. Typically such beans provide services layer functions.
Over time Acegi Security grew to offer authentication services, <code>ThreadLocal</code> management,
web request filtering, extra AOP support,
ACL features, additional authentication mechanisms and so on (for those interested,
see our <a href="changes-report.html">change log</a>).</p></subsection><subsection name="Why Use Spring"><p>There's plenty written about why the
<a href="http://www.springframework.org">Spring Framework</a>
is a good fit for modern applications. If you're not familiar with the benefits
Spring offers, please take a few minutes to learn more about it. In numerous
situations Spring will save you many months (or even years) of development time.
Not to mention your solutions will be better architected
(designed), better coded (implemented), and better supported (maintained) in the future.
</p></subsection><subsection name="Acegi Security Dependencies on Spring"><p>Acegi Security relies on the Spring IoC container to wire its classes, and execute lifecycle
methods such as <code>afterPropertiesSet()</code>. Some Acegi Security classes also
publish events to the <code>ApplicationContext</code>, although you could provide a mock
implementation of <code>ApplicationContext</code> easily enough which no-ops the method.
In other words, if you particularly didn't want Spring in your application, you <i>could</i>
avoid its use by writing equivalent getter, setter and lifecycle invocation processes
in standard Java code. This is a natural consequence of the Spring way of development,
which emphasises framework independence (it is <i>not</i> because we think there are good
reasons people would <i>not</i> use Spring).</p><p>If it sounds too hard (it's not) or counter-productive (it is) to replace Spring's IoC
services, don't forget you can always deploy Acegi Security and the Spring
IoC container solely for configuring Acegi Security. Spring does not mandate its
use in every part of your application. It will work quite successfully doing nothing more than
acting as a configuration mechanism for Acegi Security. Whilst some may regard this as excessive,
it's really no different than the traditional approach of every framework having its very
own XML or other proprietary configuration system. The main difference is that Spring is an
actual de facto standard, and you can gradually introduce it to other parts of your application
over time (if desired).</p><p>Acegi Security does <i>not</i> use any other Spring capabilities. Most notably, the
entire architecture is based around <code>Filter</code>s, not Spring's MVC framework.
This allows it to be used with any MVC framework, or even with just straight JSPs.
Acegi Security uses the AOP Alliance and AspectJ interfaces for method interception -
it does not use any Spring-specific interfaces. As a consequence, Acegi Security is very
portable to applications that do not leverage <i>any</i> of Spring's capabilities. We should note
there are several very simple data access objects (DAOs) that use Spring's JDBC abstraction
layer, although each of these are defined by a simple interface and it is very common in
even native Spring-powered applications for these to be re-implemented using the application's
persistence framework of choice (eg Hibernate).
</p></subsection></section><section name="Conclusion"><p>In summary, we recommend you take a look at Spring and consider using it in your
applications. Irrespective of whether you do so or not, we strongly recommend you use it
for configuration and lifecycle management of Acegi Security. If that is also not desired,
Acegi Security can easily be executed without Spring at all, providing you implement
similar IoC services. Acegi Security has very minimal dependencies directly on Spring,
with it being useful in many non-Spring applications and with non-Spring frameworks.
</p></section></body></document>

View File

@ -1,48 +0,0 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<document><properties><title>Acegi Security - Upgrading from version 0.3 to 0.4</title></properties><body><section name="Upgrading from 0.3 to 0.4"><p>Several changes were made between version 0.3 and 0.4 of the project.
These changes increased the modularity of the code, enhanced unit testing,
made package roles clearer, and added compelling alternatives to container
adapters and using web.xml security constraints to protect HTTP resources.
</p><p>Unfortunately, changes to the API and package locations were required. The
following should help most casual users of the project update their
applications:
<ul>
<li>All references to net.sf.acegisecurity.SecurityInterceptor become
net.sf.acegisecurity.intercept.method.MethodSecurityInterceptor.</li>
<li>All references to net.sf.acegisecurity.MethodDefinitionAttributes become
net.sf.acegisecurity.intercept.method.MethodDefinitionAttributes.</li>
<li>All references to net.sf.acegisecurity.adapters.AutoIntegrationFilter become
net.sf.acegisecurity.ui.AutoIntegrationFilter (see your web.xml).</li>
<li>If you're using container adapters (extremely likely), consider replacing
them with the net.sf.acegisecurity.ui.webapp package. This will avoid
the need to have JARs in your container classloader, and is a lot cleaner.
Refer to the reference documentation or Contacts sample application.</li>
<li>If you're using web.xml <security-constraint>s for securing HTTP URLs
(extremely likely), consider replacing it with the
net.sf.acegisecurity.intercept.web package. This will give you considerably
more flexibility, and reuse the same concepts as you'd be familiar with
via the method security interception system. Refer to the reference
documentation or Contacts sample application.</security-constraint></li>
<li>The Contacts sample application now builds two distributions: contacts.war
can be instantly deployed without configuring any container adapters,
whilst contacts-container-adapter.war still uses container adapters. The
contacts.war uses the net.sf.acegisecurity.intercept.web package to
protect HTTP URLs, rather than web.xml <security-constraint>s.</security-constraint></li>
<li>If you're using the Jetty container adapter, please check the jetty.xml
requirements in the reference documentation. There has been a minor change.</li>
</ul>
</p><p>
We hope you find the new features useful in your projects.
</p></section></body></document>

View File

@ -1,54 +0,0 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<document><properties><title>Acegi Security - Upgrading from version 0.4 to 0.5</title></properties><body><section name="Upgrading from 0.4 to 0.5"><p>The following should help most casual users of the project update their
applications:
<ul>
<li>All filters are now loaded via FilterToBeanProxy. The FilterToBeanProxy
obtains the filter from a Spring application context via the
WebApplicationContextUtils.getApplicationContext() method. Refer to the
reference documentation to see the new configuration of filters.</li>
<li>SecurityEnforcementFilter now requires an AuthenticationEntryPoint
and PortResolver. Refer to the reference documentation to see the
alternatives AuthenticationEntryPoint implementations available. Simply
use the PortResolverImpl for the PortResolver requirement.</li>
<li>Any of your login or login failure pages that previously referred to
AuthenticationProcessingFilter.ACEGI_SECURITY_LAST_EXCEPTION_KEY
should now use
net.sf.acegisecurity.ui.AbstractProcessingFilter.ACEGI_SECURITY_LAST_EXCEPTION_KEY.</li>
<li>DaoAuthenticationProvider no longer provides setters for case sensitivity
handling. The respective AuthenticationDao implementations should decide
whether or not to return User instances reflecting the exact case of the
requested username. The new PlaintextPasswordEncoder offers a setter for
ignoring the password case (defaults to require exact case matches).</li>
<li>DaoAuthenticationProvider now provides caching. Successful authentications
return DaoAuthenticationTokens. You must set the mandatory "key" property
on DaoAuthenticationProvider so these tokens can be validated. You may
also wish to change the "refreshTokenInterval" property from the default
of 60,000 milliseconds.</li>
<li>If you're using container adapters, please refer to the reference
documentation as additional JARs are now required in your container
classloader.</li>
<li>Whilst not really a change needed to your program, if you're using
Acegi Security please consider joining the acegisecurity-developer mailing
list. This is currently the best way to keep informed about the project's
status and provide feedback in design discussions. You can join at
https://lists.sourceforge.net/lists/listinfo/acegisecurity-developer.
Please continue using the Spring Users mailing list for general support.</li>
</ul>
</p><p>
There are also lots of new features you might wish to consider for your
projects. These include CAS integration, pluggable password encoders
(such as MD5 and SHA), along with pluggable salt sources. We hope you find
the new features useful in your projects.
</p></section></body></document>

View File

@ -1,76 +0,0 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<document><properties><title>Acegi Security - Upgrading from version 0.3 to 0.4</title></properties><body><section name="Upgrading from 0.5 to 0.6"><p>
The following should help most casual users of the project update their
applications:
<ul>
<li>
Locate and remove all property references to
DaoAuthenticationProvider.key and
DaoAuthenticationProvider.refreshTokenInterval.</li>
<li>If you are using DaoAuthenticationProvider and either (i) you are using
container adapters or (ii) your code relies on the Authentication object
having its getPrincipal() return a String, you must set the new
DaoAuthenticationProvider property, forcePrincipalAsString, to true.
By default DaoAuthenticationProvider returns an Authentication object
containing the relevant User, which allows access to additional properties.
Where possible, we recommend you change your code to something like this,
so that you can leave forcePrincipalAsString to the false default:<br></br><br></br>
<code>
String username = authentication.getPrincipal();<br></br>
if (authentication.getPrincipal() instanceof User) {<br></br>
username = ((User) authentication.getPrincipal()).getUsername();<br></br>
}
</code><br></br>
</li>
<li>The signature of AuthenticationDaos have changed. In concrete
implementations, modify the User to UserDetails, as shown below:<br></br><br></br>
<code>
public User loadUserByUsername(String username)<br></br>
throws UsernameNotFoundException, DataAccessException {<br></br><br></br>
to:<br></br><br></br>
public UserDetails loadUserByUsername(String username)<br></br>
throws UsernameNotFoundException, DataAccessException {<br></br><br></br>
</code>
Existing concrete implementations would be returning User, which implements
UserDetails, so no further code changes should be required.
</li>
<li>Similar signature changes (User -&gt; UserDetails) are also required to any
custom implementations of UserCache and SaltSource.</li>
<li>Any custom event listeners relying on AuthenticationEvent should note a
UserDetails is now provided in the AuthenticationEvent (not a User).</li>
<li>CAS users should note the CasAuthoritiesPopulator interface signature has
changed. Most CAS users will be using DaoCasAuthoritiesPopulator, so this
change is unlikely to require any action.</li>
<li>Please check your web.xml for whether you are using AutoIntegrationFilter.
Previously this class was loaded directly by web.xml as a filter. It is
now recommended to load it via FilterToBeanProxy and define it as a
bean in your application context. This usually involves making the entry
in web.xml match the following:<br></br><br></br>
<code>
&lt;filter&gt;<br></br>
&lt;filter-name&gt;Spring Security Auto Integration Filter&lt;/filter-name&gt;<br></br>
&lt;filter-class&gt;net.sf.acegisecurity.util.FilterToBeanProxy&lt;/filter-class&gt;<br></br>
&lt;init-param&gt;<br></br>
&lt;param-name&gt;targetClass&lt;/param-name&gt;<br></br>
&lt;param-value&gt;net.sf.acegisecurity.ui.AutoIntegrationFilter&lt;/param-value&gt;<br></br>
&lt;/init-param&gt;<br></br>
&lt;/filter&gt;<br></br>
</code>
<br></br><br></br>
Then add the following to applicationContext.xml: <br></br><br></br>
<code>
&lt;bean id="autoIntegrationFilter" class="net.sf.acegisecurity.ui.AutoIntegrationFilter"/&gt;<br></br>
</code>
</li>
</ul>
</p></section></body></document>

View File

@ -1,55 +0,0 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<document><properties><title>Acegi Security - Upgrading from version 0.6 to 0.7</title></properties><body><section name="Upgrading from 0.6 to 0.7.0"><p>
The following should help most casual users of the project update their
applications:
<ul>
<li>UserDetails now has two extra methods. Most people who have extended
Acegi Security's default User implementation of UserDetails will be fine, as
the constructor sets sensible defaults for the extra methods. People who
have written their own UserDetails implementation from scratch will need to
add the additional two methods. Returning true to both methods will normally
be correct.
</li>
<li>AutoIntegrationFilter has been removed. User should instead use
HttpSessionIntegrationFilter (in most cases), or HttpRequestIntegrationFilter
(if using most container adapters) or JbossIntegrationFilter (if using the
JBoss container adapter).</li>
<li>MethodDefinitionMap, which is usually used by MethodSecurityInterceptor
for its objectDefinitionSource property, has been changed. From 0.7.0, when
MethodDefinitionMap is queried for configuration attributes associated with
secure MethodInvocations, it will use any method matching in the method
invocation class (as it always has) plus any method matching any interface
the MethodInvocation class directly implements. So consider a PersonManager
interface, a PersonManagerImpl class that implements it, and a definition of
PersonManager.findAll=ROLE_FOO. In this example, any query for either
PersonManager.findAll OR PersonManagerImpl.findAll will return ROLE_FOO.
As we have always encouraged definition against the interface names (as per
this example), this change should not adversely impact users. This change
was necessary because of the new MethodDefinitionSourceAdvisor (see below).
Refer to the MethodDefinitionMap JavaDocs for further clarification.</li>
<li>MethodDefinitionSourceAdvisor can now be used instead of defining proxies
for secure business objects. The advisor is fully compatible with both
MethodDefinitionMap and MethodDefinitionAttributes. Using an advisor allows
caching of which methods the MethodSecurityInterceptor should handle, thus
providing a performance benefit as MethodSecurityInterceptor is not called
for public (non-secure) objects. It also simplifies configuration.</li>
<li>MethodSecurityInterceptor has moved from
net.sf.acegisecurity.intercept.method.MethodSecurityInterceptor to
net.sf.acegisecurity.intercept.method.aopalliance.MethodSecurityInterceptor.
A simple find and replace will suffice to update your application contexts.</li>
<li>All of the EH-CACHE cache implementations provided with Acegi Security have
now been refactored to use a net.sf.ehcache.Cache obtained from
EhCacheManagerFactoryBean, which is included with Spring 1.1.1 and above.
See http://opensource.atlassian.com/confluence/spring/display/DISC/Caching+the+result+of+methods+using+Spring+and+EHCache
for more about this bean, or the Contacts sample application for how to
configure the EH-CACHE implementations provided with Acegi Security.
Note the "cache" property is now required, and the old internally-managed
cache properties have been removed.</li>
</ul>
</p></section></body></document>

View File

@ -1,41 +0,0 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<document><properties><title>Acegi Security - Upgrading from version 0.7.0 to 0.8.0</title></properties><body><section name="Upgrading from 0.7.0 to 0.8.0"><p>
The following should help most casual users of the project update their
applications:
<ul>
<li>HttpSessionIntegrationFilter has been removed. Use net.sf.acegisecurity.context.HttpSessionContextIntegrationFilter instead.
Note you will need to set the mandatory "context" property to something like "net.sf.acegisecurity.context.security.SecureContextImpl".
It's not the default because we want no dependencies between the context package and the rest of Acegi Security.<br></br><br></br></li>
<li>Filter ordering has changed. See the reference guide for confirmation of the correct ordering. Basically you should have
HttpSessionContextIntegrationFilter appear before any of your authentication mechanisms.<br></br><br></br></li>
<li>IoC container hosted filter chains can now be used instead of lengthy web.xml declarations. See the reference guide or the
Contacts Sample for further information.<br></br><br></br></li>
<li>Certain classes have been moved to new packages: ContextHolderAwareRequestWrapper (and its filter),
AuthenticationSimpleHttpInvokerRequestExecutor, ContextPropagatingRemoteInvocation,
SecureContext (and its implementation). These classes were moved as part of refactorings aimed at
improving the simplicity of the project's design.<br></br><br></br></li>
<li>If you wish to use the new ConcurrentSessionController you must declare the HttpSessionEventPublisher context listener in your
web.xml<br></br><br></br></li>
<li>The JaasAuthenticationCallbackHandler interface has had it's setAuthentication method removed.
The handle method now takes both the Callback and Authentication objects as arguments.<br></br><br></br></li>
<li>Added AuthenticationException to the AutenticationEntryPoint.commence method signature.<br></br><br></br></li>
<li>Added AccessDeniedException to the SecurityEncorcementFilter.sendAccessDeniedError method signature.<br></br><br></br></li>
<li>The Authentication.getDetails() no longer returns simply the IP address used for authentication.
It now returns a WebAuthenticationDetails instance, which contains the IP address, session information,
and can be extended to store further details.<br></br><br></br></li>
</ul>
</p></section></body></document>

View File

@ -1,95 +0,0 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<document><properties><title>Acegi Security - Upgrading from version 0.8.0 to 0.9.0</title></properties><body><section name="Upgrading from 0.8.0 to 0.9.0"><p>
The following should help most casual users of the project update their
applications:
<ul>
<li>The most significant change in 0.9.0 is that <code>ContextHolder</code> and all of its
related classes have been removed. This significant change was made for the sake of consistency
with the core Spring project's approach of a single <code>ThreadLocal</code> per use case,
instead of a shared <code>ThreadLocal</code> for multiple use cases as the previous
<code>ContextHolder</code> allowed. <b>This is an important change in 0.9.0.</b> Many applications
will need to modify their code (and possibly web views) if they directly interact with the old
<code>ContextHolder</code>. The replacement security <code>ThreadLocal</code> is called
<a href="../multiproject/acegi-security/xref/net/sf/acegisecurity/context/SecurityContextHolder.html">
SecurityContextHolder</a> and provides a single getter/setter for a
<a href="../multiproject/acegi-security/xref/net/sf/acegisecurity/context/SecurityContextHolder.html">SecurityContext</a>.
<code>SecurityContextHolder</code> guarantees to never return a <code>null</code> <code>SecurityContext</code>.
<code>SecurityContext</code> provides single getter/setter for <code>Authentication</code>.<br></br><br></br>
To migrate, simply modify all your code that previously worked with <code>ContextHolder</code>,
<code>SecureContext</code> and <code>Context</code> to directly call <code>SecurityContextHolder</code>
and work with the <code>SecurityContext</code> (instead of the now removed <code>Context</code>
and <code>SecureContext</code> interfaces).<br></br><br></br>
For example, change:<br></br>
<code>
SecureContext ctx = SecureContextUtils.getSecureContext();<br></br>
</code>
to:<br></br>
<code>
SecurityContext ctx = SecurityContextHolder.getContext();<br></br>
</code>
<br></br>
and change:<br></br>
<code>
&lt;bean id="httpSessionContextIntegrationFilter" class="net.sf.acegisecurity.context.HttpSessionContextIntegrationFilter"&gt;<br></br>
&lt;property name="context"&gt;&lt;value&gt;net.sf.acegisecurity.context.security.SecureContextImpl&lt;/value&gt;&lt;/property&gt;<br></br>
&lt;/bean&gt;<br></br>
</code>
to:<br></br>
<code>
&lt;bean id="httpSessionContextIntegrationFilter" class="net.sf.acegisecurity.context.HttpSessionContextIntegrationFilter"&gt;<br></br>
&lt;property name="context"&gt;&lt;value&gt;net.sf.acegisecurity.context.SecurityContextImpl&lt;/value&gt;&lt;/property&gt;<br></br>
&lt;/bean&gt;<br></br>
</code>
<br></br>
We apologise for the inconvenience, but on a more positive note this means you receive strict
type checking, you no longer need to mess around with casting to and from <code>Context</code>
implementations, your applications no longer need to perform checking of <code>null</code> and
unexpected <code>Context</code> implementation types.<br></br><br></br></li>
<li><code>AbstractProcessingFilter</code> has changed its getter/setter approach used for customised
authentication exception directions. See the <a href="../multiproject/acegi-security/xref/net/sf/acegisecurity/ui/AbstractProcessingFilter.html">
<code>AbstractProcessingFilter</code> JavaDocs</a> to learn more.<br></br><br></br></li>
<li><code>AnonymousProcessingFilter</code> now has a <code>removeAfterRequest</code> property, which defaults to <code>true</code>. This
will cause the anonymous authentication token to be set to null at the end of each request, thus
avoiding the expense of creating a <code>HttpSession</code> in <code>HttpSessionContextIntegrationFilter</code>. You may
set this property to false if you would like the anoymous authentication token to be preserved,
which would be an unusual requirement.<br></br><br></br></li>
<li>Event publishing has been refactored. New event classes have been added, and the location of
<code>LoggerListener</code> has changed. See the <code>net.sf.acegisecurity.event package</code>.<br></br>
<br></br>
For example, change:<br></br>
<code>
&lt;bean id="loggerListener" class="net.sf.acegisecurity.providers.dao.event.LoggerListener"/&gt;<br></br>
</code>
to:<br></br>
<code>
&lt;bean id="loggerListener" class="net.sf.acegisecurity.event.authentication.LoggerListener"/&gt;
</code><br></br><br></br>
</li>
<li>Users of the <code>&lt;authz:authentication&gt;</code> JSP tag will generally need to set the <code>operation</code>
property equal to "username", as reflection is now used to retrieve the property displayed.<br></br><br></br></li>
<li>
Users of <code>net.sf.acegisecurity.wrapper.ContextHolderAwareRequestFilter</code> should note that it has been
renamed to <code>net.sf.acegisecurity.wrapper.SecurityContextHolderAwareRequestFilter</code>.<br></br><br></br>
</li>
<li>
The concurrent session support handling has changed. Please refer to the Reference Guide to
review the new configuration requirements.<br></br><br></br>
</li>
</ul>
</p></section></body></document>

View File

@ -1,95 +0,0 @@
<?xml version="1.0" encoding="ISO-8859-1"?>
<document><properties><title>Acegi Security - Upgrading from version 0.8.0 to 1.0.0</title></properties><body><section name="Upgrading from 0.9.0 to 1.0.0"><p>
The following should help most casual users of the project update their
applications:
</p></section><section name="Changes 0.9.0 to RC1"><ul>
<li>The top level package name has changed. Simply find "net.sf.acegisecurity" and replace with
"org.springframework.security".
</li>
<li>
DaoAuthenticationProvider has a property, authenticationDao. This property should now be renamed to
userDetailsService.
</li>
<li>
In JSPs, each "authz" taglib prefix must be changed from uri="http://acegisecurity.sf.net/authz"
to uri="http://acegisecurity.org/authz".
</li>
<li>net.sf.acegisecurity.providers.dao.AuthenticationDao is now
org.springframework.security.userdetails.UserDetailsService.
The interface signature has not changed. Similarly, User and UserDetails have moved into the latter's package as well.
If you've implemented your own AuthenticationDao, you'll need to change the class it's implementing and quite likely
the import packages for User and UserDetails. In addition, if using JdbcDaoImpl or InMemoryDaoImpl please
note they have moved to this new package.</li>
<li>Acegi Security is now localised. In net.sf.acegisecurity you will find a messages.properties. It is
suggested to register this in your application context, perhaps using ReloadableResourceBundleMessageSource.
If you do not do this, the default messages included in the source code will be used so this change is
not critical. The Spring LocaleContextHolder class is used to determine the locale of messages included in
exceptions. At present only the default messages.properties is included (which is in English). If
you localise this file to another language, please consider attaching it to a
<a href="http://opensource2.atlassian.com/projects/spring/secure/BrowseProject.jspa?id=10040">new JIRA task</a>
so that we can include it in future Acegi Security releases.</li>
</ul></section><section name="Changes RC1 to RC2"><ul>
<li>
org.springframework.security.ui.rememberme.RememberMeProcessingFilter now requires an authenticationManager property. This will generally
point to an implementation of org.springframework.security.providers.ProviderManager.
</li>
<li>
org.springframework.security.intercept.web.AuthenticationEntryPoint has moved to a new location,
org.springframework.security.ui.AuthenticationEntryPoint.
</li>
<li>
org.springframework.security.intercept.web.SecurityEnforcementFilter has moved to a new location and name,
org.springframework.security.ui.ExceptionTranslationFilter. In addition, the "filterSecurityInterceptor"
property on the old SecurityEnforcementFilter class has been removed. This is because
SecurityEnforcementFilter will no longer delegate to FilterSecurityInterceptor as it has in the
past. Because this delegation feature has been removed (see SEC-144 for a background as to why),
please add a new filter definition for FilterSecurityInterceptor to the end of your
FilterChainProxy. Generally you'll also rename the old SecurityEnforcementFilter entry in your
FilterChainProxy to ExceptionTranslationFilter, more accurately reflecting its purpose.
If you are not using FilterChainProxy (although we recommend that you do), you will need to add
an additional filter entry to web.xml and use FilterToBeanProxy to access the FilterSecurityInterceptor.
</li>
<li>
If you are directly using SecurityContextHolder.setContext(SecurityContext) - which is not
very common - please not that best practise is now to call SecurityContextHolder.clearContext()
if you wish to erase the contents of the SecurityContextHolder. Previously code such as
SecurityContextHolder.setContext(new SecurityContextImpl()) would have been used. The revised
method internally stores null, which helps avoids redeployment issue caused by the previous
approaches (see SEC-159 for further details).
</li>
</ul></section><section name="Changes RC2 to Final"><ul>
<li>
AbstractProcessingFilter.onUnsuccessfulAuthentication(HttpServletRequest, HttpServletResponse)
has changed it signature (SEC-238). If subclassing, please override the new signature.
</li>
<li>
ExceptionTranslationFilter no longer provides a sendAccessDenied() method. Use the
new AccessDeniedHandler instead if custom handling is required.
</li>
<li>
There have been some changes to the LDAP provider APIs to allow for future improvements, as detailed in
<a href="http://opensource.atlassian.com/projects/spring/browse/SEC-264">SEC-264</a>. These
should only affect users who have written their own extensions to the provider. The general LDAP
classes are now in the packages org.springframework.security.ldap and the
org.springframework.security.userdetails.ldap
package has been introduced. The search and authentication classes now return an
<a href="../multiproject/acegi-security/apidocs/org/acegisecurity/userdetails/ldap/LdapUserDetails.html">LdapUserDetails</a>
instance. The LdapAuthoritiesPopulator interface and its default implementation now both make use of
LdapUserDetails. Any customized versions should be updated to use the new method signatures.
</li>
</ul></section></body></document>