The fact that JSecurity is container-agnostic is certainly a
differentiator.  JSecurity aims to support security in any environment. 
In fact, we have several users that are using JSecurity in non-web
environments, such as pure-service layers or even Swing applications.  

JSecurity also aims to greatly reduce the amount of configuration
required to setup security in an application.  In many cases, JSecurity
can be configured in web-based environments via a single filter
definition.  

Another differentiator is that JSecurity provides a session framework
that is not limited to being shared across just web-based applications. 
We have users that share sessions across multiple environments, such as
Swing apps talking to a server over Spring remoting or RMI, applets, and
web applications - so they can all share common session information in a
heterogeneous environment.

JSecurity also provides powerful dynamic, instance-level authorization
control.  Essentially JSecurity supports powerful instance-level control
using String-based permissions (or Object-based, depending on
preference/environment).  For example, I could simply grant a user a
"sendNewsletter" permission.  But if I wanted instance level control, I
might grant them the permission "newsletter:send:123" where 123 is the
ID of the newsletter that they are allowed to send.  I could even grant
a user permission to "newsletter:send:*" or "newsletter:send:123,124" 
Then when I check to see if the user has the permission for
"newsletter:send:124" JSecurity would grant the authorization.  

This simplicity and power is unmatched in any existing security
framework out-of-the-box.

Finally, JSecurity strives for simplicity in all areas.  To this end, it
explicitly supports common security mechanisms used in most applications
such as roles and permissions.  This makes code more readable, limits
the amount of custom coding required, and makes security definitions
very concise and readable.  Despite our goals of simplicity we also aim
for flexibility - so out of the box the framework should be extremely
easy to get up and running, requiring minimal configuration and custom
code.  But for users who have much more advanced needs, JSecurity
provides the pluggability and extensibility to be used for almost any
security application.

Please don't hesitate to ask further questions.

Jeremy

On Fri, 30 May 2008 08:04:34 -0400, "James Carman"
<[EMAIL PROTECTED]> said:
> Isn't there something that states that an incubating project needs to
> be novel or provide something that's not already provided by another
> library (with an open-source license)?  I have looked at the JSecurity
> proposal only briefly, but it seems to me that most of what it aims to
> provide is already provided by Spring Security (a.k.a. Acegi).
> Although, Spring Security is somewhat bound to the Spring framework
> (they implement InitializingBean and stuff), so that might be what
> JSecurity is trying to provide, a container-agnostic security
> framework.
> 
> On Fri, May 30, 2008 at 2:32 AM, Bertrand Delacretaz
> <[EMAIL PROTECTED]> wrote:
> > Hi,
> >
> > On Wed, May 28, 2008 at 11:19 PM, Alan D. Cabrera <[EMAIL PROTECTED]> wrote:
> >> ...http://wiki.apache.org/incubator/JSecurityProposal...
> >
> > Looks good to me, IMHO this is ready for a vote.
> > -Bertrand
> >
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: [EMAIL PROTECTED]
> > For additional commands, e-mail: [EMAIL PROTECTED]
> >
> >
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
> 

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to