+LdapAuthenticationProvider instances:
+
+<%=
+WebApplicationContextUtils.getRequiredWebApplicationContext(
+ session.getServletContext()).getBeansOfType(LdapAuthenticationProvider.class)
+%>
+
+Providers:
+
+<%=
+((ProviderManager)WebApplicationContextUtils.getRequiredWebApplicationContext(
+ session.getServletContext()).getBean("_authenticationManager")).getProviders() %>
+
Anyone can view this page.
--If you're logged in, you can list accounts. +
+Test multi-action controller SEC-830.
Your principal object is....: <%= request.getUserPrincipal() %>
- +@@ -140,7 +140,7 @@ org.springframework.security.AccessDeniedException: Access is denied
This question comes up repeatedly in the Spring Security forum so you will find more information there.
The submitted login information is processed by an instance of AuthenticationProcessingFilter. You will need to customize this class to handle - the extra data field(s). One option is to use your own customized authentication token class (rather than the standard UsernamePasswordAuthenticatioToken), + the extra data field(s). One option is to use your own customized authentication token class (rather than the standard UsernamePasswordAuthenticationToken), another is simply to concatenate the extra fields with the username (for example, using a ":" as the separator) and pass them in the username property of - UsernamePasswordAuthenticatioToken. + UsernamePasswordAuthenticationToken.
You will also need to customize the actual authentication process. If you are using a custom authentication token class, for example, you will have to write an
diff --git a/taglibs/pom.xml b/taglibs/pom.xml
index db748a82a3..3d670d1077 100644
--- a/taglibs/pom.xml
+++ b/taglibs/pom.xml
@@ -3,13 +3,13 @@