Improvements to Javadoc.

This commit is contained in:
Luke Taylor 2008-12-16 02:06:26 +00:00
parent 55cc98ab54
commit bf409b5b25
1 changed files with 38 additions and 22 deletions

View File

@ -20,18 +20,26 @@ import java.io.Serializable;
import java.security.Principal;
import java.util.List;
import org.springframework.security.context.SecurityContextHolder;
/**
* Represents an authentication request.
*
* Represents the token for an authentication request or for an authenticated principal once the request has been
* processed by the {@link AuthenticationManager#authenticate(Authentication)} method.
* <p>
* An <code>Authentication</code> object is not considered authenticated until
* it is processed by an {@link AuthenticationManager}.
* </p>
* Once the request has been authenticated, the <tt>Authentication</tt> will usually be stored in a thread-local
* <tt>SecurityContext</tt> managed by the {@link SecurityContextHolder} by the authentication mechanism which is
* being used. An explicit authentication can be achieved, without using one of Spring Security's authentication
* mechanisms, by creating an <tt>Authentication</tt> instance and using the code:
*
* <p>
* Stored in a request {@link org.springframework.security.context.SecurityContext}.
* </p>
* <pre>
* SecurityContextHolder.getContext().setAuthentication(anAuthentication);
* </pre>
* Note that unless the <tt>Authentication</tt> has the <tt>authenticated</tt> property set to <tt>true</tt>, it will
* still be authenticated by any security interceptor (for method or web invocations) which encounters it.
*
* In most cases, the framework transparently takes care of managing the security context and authentication objects
* for you.
*
* @author Ben Alex
* @version $Id$
@ -66,10 +74,15 @@ public interface Authentication extends Principal, Serializable {
Object getDetails();
/**
* The identity of the principal being authenticated. This is usually a username. Callers are expected to
* populate the principal.
* The identity of the principal being authenticated. In the case of an authentication request with username and
* password, this would be the username. Callers are expected to populate the principal for an authentication
* request.
* <p>
* The <tt>AuthenticationManager</tt> implementation will often return an <tt>Authentication</tt> containing
* richer information as the principal for use by the application. Many of the authentication providers will
* create a {@link UserDetails} object as the principal.
*
* @return the <code>Principal</code> being authenticated
* @return the <code>Principal</code> being authenticated or the authenticated principal after authentication.
*/
Object getPrincipal();
@ -79,21 +92,25 @@ public interface Authentication extends Principal, Serializable {
* (or, more often, one of its <code>AuthenticationProvider</code>s) will return an immutable authentication token
* after successful authentication, in which case that token can safely return <code>true</code> to this method.
* Returning <code>true</code> will improve performance, as calling the <code>AuthenticationManager</code> for
* every request will no longer be necessary.<p>For security reasons, implementations of this interface
* should be very careful about returning <code>true</code> to this method unless they are either immutable, or
* have some way of ensuring the properties have not been changed since original creation.</p>
* every request will no longer be necessary.
* <p>
* For security reasons, implementations of this interface should be very careful about returning
* <code>true</code> from this method unless they are either immutable, or have some way of ensuring the properties
* have not been changed since original creation.
*
* @return true if the token has been authenticated and the <code>AbstractSecurityInterceptor</code> does not need
* to represent the token for re-authentication to the <code>AuthenticationManager</code>
* to present the token to the <code>AuthenticationManager</code> again for re-authentication.
*/
boolean isAuthenticated();
/**
* See {@link #isAuthenticated()} for a full description.<p>Implementations should <b>always</b> allow this
* method to be called with a <code>false</code> parameter, as this is used by various classes to specify the
* authentication token should not be trusted. If an implementation wishes to reject an invocation with a
* <code>true</code> parameter (which would indicate the authentication token is trusted - a potential security
* risk) the implementation should throw an {@link IllegalArgumentException}.</p>
* See {@link #isAuthenticated()} for a full description.
* <p>
* Implementations should <b>always</b> allow this method to be called with a <code>false</code> parameter,
* as this is used by various classes to specify the authentication token should not be trusted.
* If an implementation wishes to reject an invocation with a <code>true</code> parameter (which would indicate
* the authentication token is trusted - a potential security risk) the implementation should throw an
* {@link IllegalArgumentException}.
*
* @param isAuthenticated <code>true</code> if the token should be trusted (which may result in an exception) or
* <code>false</code> if the token should not be trusted
@ -102,6 +119,5 @@ public interface Authentication extends Principal, Serializable {
* <code>true</code> as the argument) is rejected due to the implementation being immutable or
* implementing its own alternative approach to {@link #isAuthenticated()}
*/
void setAuthenticated(boolean isAuthenticated)
throws IllegalArgumentException;
void setAuthenticated(boolean isAuthenticated) throws IllegalArgumentException;
}