You are viewing a plain text version of this content. The canonical link for it is here.
Posted to jetspeed-dev@portals.apache.org by pa...@apache.org on 2002/06/04 14:12:23 UTC
cvs commit: jakarta-jetspeed/proposals Security.txt
paulsp 2002/06/04 05:12:23
Modified: proposals Security.txt
Log:
Renamed security-entry attribute id to name. The entry is now consistant
when other registry entries in the registry.
Revision Changes Path
1.5 +11 -8 jakarta-jetspeed/proposals/Security.txt
Index: Security.txt
===================================================================
RCS file: /home/cvs/jakarta-jetspeed/proposals/Security.txt,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -r1.4 -r1.5
--- Security.txt 28 May 2002 23:04:55 -0000 1.4
+++ Security.txt 4 Jun 2002 12:12:22 -0000 1.5
@@ -1,5 +1,5 @@
Jetspeed Proposal: Portal Security 1.4
-LAST MODIFIED: $Date: 2002/05/28 23:04:55 $
+LAST MODIFIED: $Date: 2002/06/04 12:12:22 $
AUTHOR: taylor@apache.org, paulsp@apache.org
STATUS:
@@ -27,7 +27,7 @@
An original goal was to base this service on the Java Security Architecture and JAAS standards.
We have since decided to scale back this proposal and to implement a simple security service that is
not tied to any optional Java packages. JAAS is only a part of the JDK starting with version 1.4.
-In the spirit of Jetspeed's easy installation and deployment, a security system with minimal configuration
+In the spirit of Jetspeed's easy installation and deployment, a security system with minimal configuration
is the best starting point for a default implementation.
After the default implementation is completed, we hope to soon have interest in creating both LDAP and JAAS solutions.
@@ -197,7 +197,7 @@
3. Authorization
4. Security Entity Maintenance
-The security service implementation can be conformant on two levels:
+The security service implementation can be conformant on two levels:
1. Level One Conformant - implements required interfaces
2. Level Two Conformant - implements all interfaces
@@ -360,6 +360,7 @@
3. The permission tag dropped
An authorization constraint is defined as a security element in either a PSML element or in a Registry.
+
Constraints are applied to Portlet Resources. The types of resources that may have security constraints are:
1. Portlet entries in the Registry
@@ -424,7 +425,7 @@
Attributes
-1. id (required)
+1. name (required)
Elements
@@ -476,7 +477,7 @@
Example:
-----------------------------------------
-<security-entry id='pigInAPoke7'>
+<security-entry name='pigInAPoke7'>
<access action="view">
<allow-if role="clerk">
<allow-if role="manager">
@@ -498,10 +499,12 @@
3. Use its own policy or other repository
4. Dynamically load and check constraints from the Jetspeed Security Registry
-These master constraints can be referenced by security constraints in PSML or other registry entries.
+These master constraints can be referenced by security constraints in PSML or
+other registry entries.
-When implementing your own Jetspeed Security, entry ids can be used with external, centralized policy managers.
-The id can be used to uniquely reference a security constraint in an external security policy.
+When implementing your own Jetspeed Security, entry ids can be used with
+external, centralized policy managers. The name can be used to uniquely
+reference a security constraint in an external security policy.
--------------------------------------
--
To unsubscribe, e-mail: <ma...@jakarta.apache.org>
For additional commands, e-mail: <ma...@jakarta.apache.org>