Les Hazlewood wrote:

> I've given presentations on JSecurity and had many discussions in
> private, and I always ask my audience:  "How many people have heard
> of JAAS?"  Maybe 40-50% of the listeners affirm they have.  Then I
> ask, "how many of you have used the JAAS API or its constructs
> (permissions files, etc)?".  That number has been consistently
> around 1-2%.

Right.  But that is probably because most of the other 98%-99% of JEE 
developers rely on container-managed access, and don't write any security code. 
 If anything, they might make a role-check in UI code to see what navigation 
options to offer.  The percentage of JEE developers who need more than 
container-managed, role-based, authorization is relatively low, although for 
those who need it, it is essential.

Container-managed security fails at the instance level, e.g., the container can 
restrict access to the ClientAccount bean methods to the Customer role, but 
does not enforce WHICH customer login can access WHICH bean instance.  What is 
JSecurity's approach, and what would it look like for the lookup (JNDI) and 
injection (annotation) models?

        --- Noel



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to