You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@jena.apache.org by bu...@apache.org on 2016/11/07 22:06:45 UTC
svn commit: r1000690 - in /websites/staging/jena/trunk/content: ./
documentation/fuseki2/fuseki-security.html
Author: buildbot
Date: Mon Nov 7 22:06:45 2016
New Revision: 1000690
Log:
Staging update by buildbot for jena
Modified:
websites/staging/jena/trunk/content/ (props changed)
websites/staging/jena/trunk/content/documentation/fuseki2/fuseki-security.html
Propchange: websites/staging/jena/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Mon Nov 7 22:06:45 2016
@@ -1 +1 @@
-1768597
+1768598
Modified: websites/staging/jena/trunk/content/documentation/fuseki2/fuseki-security.html
==============================================================================
--- websites/staging/jena/trunk/content/documentation/fuseki2/fuseki-security.html (original)
+++ websites/staging/jena/trunk/content/documentation/fuseki2/fuseki-security.html Mon Nov 7 22:06:45 2016
@@ -166,12 +166,17 @@ actions are limited to the localhost. "l
connecting using the <code>http://localhost:.../...</code>. It must be "localhost", or
<code>127.0.0.1</code> (IPv4), or <code>[::1]</code> (IPv6), not the external IP address of the
machine.</p>
+<p>Once shiro has been configured to perform user authentication it provides
+a good foundation on which to implement the <a href="../permissions/">Jena Permissions</a>
+layer. There is an <a href="../permissions/example.html">example implementation</a>
+documented in the Jena Permissions section. The Jena Permissions layer can
+be used to restrict access to specific graphs or triples within graphs.</p>
<p>There is an example to enable simple user/password security; this is only
suitable where the connection is secure, is shown <code>shiro.ini</code> file with
defaults user 'admin' and password 'pw'. These should be changed before
use.</p>
<p>This has some use where the server is in a secure network environment with
-additional restrictions on extenral requests also applied. behind a
+additional restrictions on external requests also applied. behind a
reverse proxy and the connection can have addition security (e.g. no access
to URLs starting '/$/').</p>
<p>The Apache Shiro website has documentation for creating more sophisticated