mirror of
https://github.com/spring-projects/spring-security.git
synced 2025-06-01 09:42:13 +00:00
Typos.
This commit is contained in:
parent
c8055b57d7
commit
7df43e019e
@ -27,7 +27,7 @@
|
|||||||
</head>
|
</head>
|
||||||
|
|
||||||
<body>
|
<body>
|
||||||
<h1>External Web Articles covering Acegi Security<</h1>
|
<h1>External Web Articles covering Acegi Security</h1>
|
||||||
<p>Here are some of the external pages mentioning Acegi Security. If you've
|
<p>Here are some of the external pages mentioning Acegi Security. If you've
|
||||||
found another, please let us know.
|
found another, please let us know.
|
||||||
<ul>
|
<ul>
|
||||||
|
@ -46,7 +46,7 @@
|
|||||||
can be easily supported.</p>
|
can be easily supported.</p>
|
||||||
|
|
||||||
<h2>Why not just use web.xml security?</h2>
|
<h2>Why not just use web.xml security?</h2>
|
||||||
<p>Let's assuming you're developing an enterprise application based on Spring.
|
<p>Let's assume you're developing an enterprise application based on Spring.
|
||||||
There are four security concerns you typically need to address: authentication,
|
There are four security concerns you typically need to address: authentication,
|
||||||
web request security, service layer security (ie your methods that implement
|
web request security, service layer security (ie your methods that implement
|
||||||
business logic), and domain object instance security (ie different domain objects
|
business logic), and domain object instance security (ie different domain objects
|
||||||
@ -102,8 +102,8 @@
|
|||||||
so would introduce an additional argument on every services
|
so would introduce an additional argument on every services
|
||||||
layer method. A more elegant approach is to use a ThreadLocal
|
layer method. A more elegant approach is to use a ThreadLocal
|
||||||
to hold the Principal, although this would likely increase
|
to hold the Principal, although this would likely increase
|
||||||
development time to a point where it would become more e
|
development time to a point where it would become more
|
||||||
conomical (on a cost-benefit basis) to simply use a dedicated
|
economical (on a cost-benefit basis) to simply use a dedicated
|
||||||
security framework.</li>
|
security framework.</li>
|
||||||
<li><i>Authorisation code quality:</i> It is often said of web
|
<li><i>Authorisation code quality:</i> It is often said of web
|
||||||
frameworks that they "make it easier to do the right things,
|
frameworks that they "make it easier to do the right things,
|
||||||
@ -117,7 +117,7 @@
|
|||||||
</ol>
|
</ol>
|
||||||
</li>
|
</li>
|
||||||
</ol>
|
</ol>
|
||||||
For simple applications, servlet specification may just be enough.
|
For simple applications, servlet specification security may just be enough.
|
||||||
Although when considered within the context of web container portability,
|
Although when considered within the context of web container portability,
|
||||||
configuration requirements, limited web request security flexibility, and
|
configuration requirements, limited web request security flexibility, and
|
||||||
non-existent services layer and domain object instance security, it becomes
|
non-existent services layer and domain object instance security, it becomes
|
||||||
@ -148,9 +148,10 @@
|
|||||||
<code>AuthenticationDao</code> implementations that simply don't properly
|
<code>AuthenticationDao</code> implementations that simply don't properly
|
||||||
implement the interface. For example, they return <code>null</code> instead
|
implement the interface. For example, they return <code>null</code> instead
|
||||||
of the user not found exception, or fail to add in the
|
of the user not found exception, or fail to add in the
|
||||||
<code>GrantedAuthority[]</code>s. We suggest you write the
|
<code>GrantedAuthority[]</code>s. Whilst <code>DaoAuthenticationProvider</code>
|
||||||
<code>UserDetails</code> object generated by your <code>AuthenticationDao</code>
|
does its best to check the <code>AuthenticationDao</code>returns a valid
|
||||||
to the log and check it looks correct.</p>
|
<code>UserDetails</code>, we suggest you write the
|
||||||
|
<code>UserDetails</code> object to the log and check it looks correct.</p>
|
||||||
|
|
||||||
<h2>I need some help. What files should I post?</h2>
|
<h2>I need some help. What files should I post?</h2>
|
||||||
<p>The most important things to post with any support requests on the
|
<p>The most important things to post with any support requests on the
|
||||||
@ -208,7 +209,7 @@
|
|||||||
Log4J (instead of JDK logging), Tapestry (instead of JSF), and Velocity/FreeMarker
|
Log4J (instead of JDK logging), Tapestry (instead of JSF), and Velocity/FreeMarker
|
||||||
(instead of JSP). It's important to recognise that many open source projects do
|
(instead of JSP). It's important to recognise that many open source projects do
|
||||||
develop into de facto standards, and in doing so play a legitimate and beneficial
|
develop into de facto standards, and in doing so play a legitimate and beneficial
|
||||||
role in the software development profession.</p>
|
role in professional software development.</p>
|
||||||
|
|
||||||
<h2>Do you welcome contributions?</h2>
|
<h2>Do you welcome contributions?</h2>
|
||||||
<p>Yes. If you've written something and it works well, please feel free to share it.
|
<p>Yes. If you've written something and it works well, please feel free to share it.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user