Channa,
On 10/27/23 00:07, Channa Puchakayala wrote:
Tomcat Version : 9.0.75
Operating System: Windows and Linux
Bits: 64
Tomcat 9.0.75 not honoring session timeout configured in
tomcat/conf/web.xml for FORM Authentication and it is effecting customers
2023 05:07:20 Channa Puchakayala
:
Hi All,
Tomcat Version : 9.0.75
Operating System: Windows and Linux
Bits: 64
Tomcat 9.0.75 not honoring session timeout configured in
tomcat/conf/web.xml for FORM Authentication and it is effecting
customers.
==
Hi All,
Tomcat Version : 9.0.75
Operating System: Windows and Linux
Bits: 64
Tomcat 9.0.75 not honoring session timeout configured in
tomcat/conf/web.xml for FORM Authentication and it is effecting customers.
==
30 // 30 minutes
Mark
Look for ***>>> for my response.
-Original Message-
From: Mark Eggers [mailto:its_toas...@yahoo.com.INVALID]
Sent: Monday, July 13, 2015 2:13 PM
To: Tomcat Users List
Subject: Re: Form authentication with Tomcat 7.0.63 behind Apache HTTPD and
mod_jk
-BEGIN PGP SIGNE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Folks,
I have resolved the issue:
On 7/10/2015 11:27 AM, Mark Eggers wrote:
> Now with the shipped examples goodness:
>
>
> On 7/9/2015 10:39 PM, Konstantin Kolinko wrote:
>> 2015-07-10 2:35 GMT+03:00 Mark Eggers
>> :
>>>
>>> Folks,
>>>
>>> I seem
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Now with the shipped examples goodness:
On 7/9/2015 10:39 PM, Konstantin Kolinko wrote:
> 2015-07-10 2:35 GMT+03:00 Mark Eggers
> :
>>
>> Folks,
>>
>> I seem to be having a problem trying to use form-based
>> authentication. What worked in 7.0.62
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Konstantin,
On 7/9/2015 10:39 PM, Konstantin Kolinko wrote:
> 2015-07-10 2:35 GMT+03:00 Mark Eggers
> :
>>
>> Folks,
>>
>> I seem to be having a problem trying to use form-based
>> authentication. What worked in 7.0.62 no longer works in 7.0.63.
>>
2015-07-10 2:35 GMT+03:00 Mark Eggers :
>
> Folks,
>
> I seem to be having a problem trying to use form-based authentication.
> What worked in 7.0.62 no longer works in 7.0.63. Using 7.0.62 I can
> successfully authenticate in my toy application and the latest version
> of Jenkins. Using 7.0.63 I e
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Folks,
I seem to be having a problem trying to use form-based authentication.
What worked in 7.0.62 no longer works in 7.0.63. Using 7.0.62 I can
successfully authenticate in my toy application and the latest version
of Jenkins. Using 7.0.63 I end up
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Jan,
On 7/16/13 3:55 AM, Jan Vávra wrote:
> I've solved my problem. The correct attitude is to have all
> contexts unauthenticated and only few restrict. In my case
> restricted urls are /index.jsp, /admin/*, /user/*
>
> In the original web.xml I h
Hi.
I've solved my problem. The correct attitude is to have all contexts
unauthenticated and only few restrict. In my case restricted urls are
/index.jsp, /admin/*, /user/*
In the original web.xml I had all contexts restricted and static context
/common/* was masked out. Although the /common
On 6/27/2013 9:37 AM, Jan Vávra wrote:
> Hi.
>
> Note that Cache-Control:private does not disable caching. Instead, it
> disables public-caching for proxies. The browser is still free to
> cache the document in certain ways.
>
> True disabling of the cache would be to set Cache-Control to
> "no-cac
Hi.
Note that Cache-Control:private does not disable caching. Instead, it
disables public-caching for proxies. The browser is still free to
cache the document in certain ways.
True disabling of the cache would be to set Cache-Control to
"no-cache" or "no-store" (though no-store is usually more a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Jan,
On 6/26/13 7:36 AM, Jan Vávra wrote:
> If I use auth-method FORM, all requests return with headers
> denying caching on the browser side although I have excluded some
> part of my app from authentication.
>
> The headers for a png image are:
>
Hello,
If I use auth-method FORM, all requests return with headers denying
caching on the browser side although I have excluded some part of my app
from authentication.
The headers for a png image are:
HTTP/1.1 304 Not Modified
Server: Apache-Coyote/1.1
Cache-Control: private
Expires: Thu,
ication, something as :
>
>
> *.css
>
>
> (probably not a valid security-constraint, just to give the idea)
>
> I did this kind of thing for the favicon. We had a webapp entirely
> protected by form authentication and on firefox after authentication
> we were directed
idea)
I did this kind of thing for the favicon. We had a webapp entirely
protected by form authentication and on firefox after authentication
we were directed to the favicon.ico (when one existed). Firefox seems
to get the favicon after the first request even when the status is
401... So we had t
This is driving me crazy! I have configured from authentication in my
web.xml with a number of security constraints. None of the constraints map
to any CSS files. However, when I bring up the application the CSS files
are hitting the authentication. Since my form has styling this is a
problem o
On Mon, 2012-07-30 at 14:36 -0600, Mark Thomas wrote:
> On 30/07/2012 21:24, Kris Easter wrote:
> >
> ...
> >
> > If the user sits too long on the login page the session times out, even
> > if their credentials were authenticated successfully, and sends them
> > back to the login page where they
On 30/07/2012 21:24, Kris Easter wrote:
>
> I'm looking at the org.apache.catalina.authenticator.FormAuthenticator
> class from the 7.0.29 src. This portion of the authenticate method
> starting around line 301 is where I'm having a little problem:
>
>
> if (log.isDebugEnabled()) {
> log.debu
I'm looking at the org.apache.catalina.authenticator.FormAuthenticator
class from the 7.0.29 src. This portion of the authenticate method
starting around line 301 is where I'm having a little problem:
if (log.isDebugEnabled()) {
log.debug("Authentication of '" + username + "' was successful")
On 2/5/2012 2:53 PM, Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jess,
On 2/5/12 1:23 PM, Jess Holle wrote:
Certainly this is an optional / quality of implementation feature.
I'm perfectly aware that other form-based authentication solutions
will not save POST data
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jess,
On 2/5/12 1:23 PM, Jess Holle wrote:
> Certainly this is an optional / quality of implementation feature.
> I'm perfectly aware that other form-based authentication solutions
> will not save POST data and may even fail to replay requests at
> al
On 2/5/2012 12:22 PM, Konstantin Kolinko wrote:
2012/2/5 Jess Holle :
Also it strikes me that maxSavePostSize should really be backed up by a use
of a SoftReference in SavedRequest.
This would allow one to allow relatively large POST bodies to be saved
unless/until this threatened to consume th
On 2/5/2012 12:04 PM, André Warnier wrote:
Hi.
I've just been following this thread, and this is not about the
problem per se, but a comment about the overall design of the
application.
The fact that you do a POST without being authenticated, and that you
rely on the server to save the POST
2012/2/5 Jess Holle :
> On 2/5/2012 11:15 AM, Konstantin Kolinko wrote:
>>
>> I think this issue is specific to AJP.
>>
>> For HTTP connectors a similar issue was noted and fixed here:
>> https://issues.apache.org/bugzilla/show_bug.cgi?id=51940#c9
>>
>> I think adding the following line to "REQ_SET
On 2/5/2012 11:24 AM, Jess Holle wrote:
On 2/5/2012 11:22 AM, Jess Holle wrote:
On 2/5/2012 11:15 AM, Konstantin Kolinko wrote:
I think this issue is specific to AJP.
For HTTP connectors a similar issue was noted and fixed here:
https://issues.apache.org/bugzilla/show_bug.cgi?id=51940#c9
I th
Hi.
I've just been following this thread, and this is not about the problem per se, but a
comment about the overall design of the application.
The fact that you do a POST without being authenticated, and that you rely on the server
to save the POST content while the authentication is taking p
On 2/5/2012 11:22 AM, Jess Holle wrote:
On 2/5/2012 11:15 AM, Konstantin Kolinko wrote:
I think this issue is specific to AJP.
For HTTP connectors a similar issue was noted and fixed here:
https://issues.apache.org/bugzilla/show_bug.cgi?id=51940#c9
I think adding the following line to "REQ_SET
On 2/5/2012 11:15 AM, Konstantin Kolinko wrote:
I think this issue is specific to AJP.
For HTTP connectors a similar issue was noted and fixed here:
https://issues.apache.org/bugzilla/show_bug.cgi?id=51940#c9
I think adding the following line to "REQ_SET_BODY_REPLAY" case in
AbstractAjpProcesso
2012/2/5 Jess Holle :
> On 2/5/2012 9:43 AM, Jess Holle wrote:
>>
>> On 2/5/2012 9:26 AM, Konstantin Kolinko wrote:
>>>
>>> build.xml:
>>> >> debug="${compile.debug}"
>>> deprecation="${compile.deprecation}"
>>> source="${compile.source}"
>>> target="${co
On 2/5/2012 10:38 AM, Jess Holle wrote:
Diving in deeper, I see that AbstractAjpProcessor.action() is setting
the bodyBytes perfectly for the ActionCode.REQ_SET_BODY_REPLAY case here.
After that is done, however, I don't see anything that tries to read
AbstractAjpProcessor.bodyBytes.
org.apa
On 2/5/2012 9:43 AM, Jess Holle wrote:
On 2/5/2012 9:26 AM, Konstantin Kolinko wrote:
build.xml:
build.properties.default:
compile.debug=true
Thus debug information should already be there.
I usually start with setting some breakpoints. In your case take a
look at FormAuthenticator#saveReque
On 2/5/2012 9:26 AM, Konstantin Kolinko wrote:
build.xml:
build.properties.default:
compile.debug=true
Thus debug information should already be there.
I usually start with setting some breakpoints. In your case take a
look at FormAuthenticator#saveRequest() and #restoreRequest() methods
2012/2/5 Jess Holle :
> On 2/5/2012 8:29 AM, Konstantin Kolinko wrote:
>
> 2. Enable debug logging for FormAuthenticator class.
>
> org.apache.catalina.authenticator.FormAuthenticator.level=FINE
>(...)
>
> I had already increased verbosity for FormAuthenticator -- nothing seemed
> amiss from what I
On 2/5/2012 8:29 AM, Konstantin Kolinko wrote:
2012/2/5 Jess Holle:
I've done all the basic troubleshooting tweaks I can think of, trying 7.0.25
and 7.0.23, switching my web.xml back to the 2.5 spec level, reducing from a
combination of 2 JNDI realms to 1, cranking lots of loggers up to full
ver
2012/2/5 Jess Holle :
> I've done all the basic troubleshooting tweaks I can think of, trying 7.0.25
> and 7.0.23, switching my web.xml back to the 2.5 spec level, reducing from a
> combination of 2 JNDI realms to 1, cranking lots of loggers up to full
> verbosity, etc.
>
> In all cases I lose the
I've done all the basic troubleshooting tweaks I can think of, trying
7.0.25 and 7.0.23, switching my web.xml back to the 2.5 spec level,
reducing from a combination of 2 JNDI realms to 1, cranking lots of
loggers up to full verbosity, etc.
In all cases I lose the POST parameters.
I guess I e
Yes, I'm using Tomcat authentication. Yes, the issue is after
authentication on the POST retry.
On 2/4/2012 12:27 PM, Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jess,
On 2/3/12 5:59 PM, Jess Holle wrote:
Or could this be getting loused up by having a servlet re
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Konstantin,
On 2/3/12 6:26 PM, Konstantin Kolinko wrote:
> 2012/2/4 Jess Holle :
>> I posted a query recently wherein I thought that POST data was
>> being lost *only* if the user had been authenticated, their
>> session timed out, and then they POST'
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jess,
On 2/3/12 5:59 PM, Jess Holle wrote:
> Or could this be getting loused up by having a servlet request
> filter that calls getParameterMap() first thing?
>
> I'd *assume* not -- as that would be pretty hokey...
Probably not: Tomcat's valves (in
On 2/3/2012 5:26 PM, Konstantin Kolinko wrote:
2012/2/4 Jess Holle:
I posted a query recently wherein I thought that POST data was being lost
*only* if the user had been authenticated, their session timed out, and then
they POST'ed to a URL requiring authentication -- thus having their request
i
2012/2/4 Jess Holle :
> I posted a query recently wherein I thought that POST data was being lost
> *only* if the user had been authenticated, their session timed out, and then
> they POST'ed to a URL requiring authentication -- thus having their request
> interrupted for a form-based login.
>
> I
Or could this be getting loused up by having a servlet request filter
that calls getParameterMap() first thing?
I'd *assume* not -- as that would be pretty hokey...
On 2/3/2012 4:53 PM, Jess Holle wrote:
In case this makes any difference this is with the AJP BIO connector.
On 2/3/2012 4:51 PM
In case this makes any difference this is with the AJP BIO connector.
On 2/3/2012 4:51 PM, Jess Holle wrote:
I posted a query recently wherein I thought that POST data was being
lost *only* if the user had been authenticated, their session timed
out, and then they POST'ed to a URL requiring aut
I posted a query recently wherein I thought that POST data was being
lost *only* if the user had been authenticated, their session timed out,
and then they POST'ed to a URL requiring authentication -- thus having
their request interrupted for a form-based login.
I know Tomcat is supposed to pr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jess,
On 2/1/12 2:10 PM, Jess Holle wrote:
> I've noticed that if I POST to an authenticated URL in a web app
> configured for form-based authentication, Tomcat delivers the login
> form, and then replays the POST just fine *unless* the current
> sta
I've noticed that if I POST to an authenticated URL in a web app
configured for form-based authentication, Tomcat delivers the login
form, and then replays the POST just fine *unless* the current state of
the browser is one where I had already been authenticated but that
session had timed out.
You get an error when that's what's occurring, though.
On 12/7/2011 12:55 PM, Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jess,
On 12/6/11 6:17 PM, Jess Holle wrote:
Okay, I now notice this plainly stated in the documentation for
JNDIRealm (which I'm using):
The
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jess,
On 12/6/11 6:17 PM, Jess Holle wrote:
> Okay, I now notice this plainly stated in the documentation for
> JNDIRealm (which I'm using):
>
> The cached user is *not* saved and restored across sessions
> serialisations.
>
> That seems a bit odd
>> The data contain user's password. You wouldn't want the password to be
>> written to disk. It is safer if it is kept in memory only.
>>
That depends on usage. Realm are used not only for Form
authentication, but
It should serialize User and Principles nothing more, no need for password.
On Wed, Dec 7, 2011 at 4:12 PM, Konstantin Kolinko
wrote:
> 2011/12/7 Jess Holle :
> > I should have noted that this is with Tomcat 7.0.23, but it seemed
> unlikely
> > to be JVM (Java 6 Update 29) or OS (Windows 7) speci
2011/12/7 Jess Holle :
> I should have noted that this is with Tomcat 7.0.23, but it seemed unlikely
> to be JVM (Java 6 Update 29) or OS (Windows 7) specific.
>
> Of course given that I found that the documentation clearly states this
> behavior, I suspect this is longstanding Tomcat behavior.
>
>
Yes, I now note this in the documentation.
The question remains, however: /why /does it work this way?
On 12/7/2011 6:34 AM, Mohammad M. AbuZer wrote:
Tomcat does that for every all Form Authentication even if you used
`DatabaseRealm` it doesn't save logged user.
On Wed, Dec 7, 2011 at
Tomcat does that for every all Form Authentication even if you used
`DatabaseRealm` it doesn't save logged user.
On Wed, Dec 7, 2011 at 2:24 PM, Jess Holle wrote:
> I should have noted that this is with Tomcat 7.0.23, but it seemed
> unlikely to be JVM (Java 6 Update 29) or OS
I should have noted that this is with Tomcat 7.0.23, but it seemed
unlikely to be JVM (Java 6 Update 29) or OS (Windows 7) specific.
Of course given that I found that the documentation clearly states this
behavior, I suspect this is longstanding Tomcat behavior.
My remaining question is /why/
Jess Holle wrote:
When doing a graceful shutdown of Tomcat, the sessions are persisted to
disk and then re-read on startup (at least in all reasonably recent
versions).
Oddly, however, form-based authentication does not seem to survive a
graceful restart. Rather one has to log in again. Is
Okay, I now notice this plainly stated in the documentation for
JNDIRealm (which I'm using):
The cached user is *not* saved and restored across sessions
serialisations.
That seems a bit odd...
On 12/6/2011 5:12 PM, Jess Holle wrote:
When doing a graceful shutdown of Tomcat, the sessions
When doing a graceful shutdown of Tomcat, the sessions are persisted to
disk and then re-read on startup (at least in all reasonably recent
versions).
Oddly, however, form-based authentication does not seem to survive a
graceful restart. Rather one has to log in again. Is this known?
Inten
On 1:59 PM, Nicholas Sushkin wrote:
The bug was that if you do an unauthenticated POST, PUT, or DELETE,
the Form Authentication valve was trying to do a POST, PUT, or DELETE
to the login form. The correct behaviour IMHO is to always GET the
login form and return it as a response to the
> From: Nicholas Sushkin [mailto:nsush...@openfinance.com]
> Subject: Re: Should Form Authentication Valve restore request body on a PUT?
> The correct behaviour IMHO is to always GET the login form and return
> it as a response to the unauthenticated request of any kind. Then, onc
The bug was that if you do an unauthenticated POST, PUT, or DELETE, the Form
Authentication valve was trying to do a POST, PUT, or DELETE to the login
form. The correct behaviour IMHO is to always GET the login form and return it
as a response to the unauthenticated request of any kind. Then
Before being forwarded to login page, the request is saved and only then
turned into GET, before dispatching the forward to the login page. After login
form is submitted, the original request is restored from the saved state and
is replayed.
On Friday, October 07, 2011 12:51:48 Caldarale, Charl
> From: Nicholas Sushkin [mailto:nsush...@openfinance.com]
> Subject: Re: Should Form Authentication Valve restore request body on a PUT?
> I set request method to "GET" on all unauthenticated requests that
> forward to the login page.
I'm confused. If you turn a PU
Charles,
Thanks for the suggestion.
I set request method to "GET" on all unauthenticated requests that forward to
the login page. That tested well for all RESTful methods, POST, PUT, GET, and
DELETE.
Submitted a patch.
https://issues.apache.org/bugzilla/show_bug.cgi?id=51940#c2
On Friday, Oct
Yup. The body of the POST got written into my login.html. Took me a while to
notice that. Good one!
On Friday, October 07, 2011 10:13:00 Christopher Schultz wrote:
> If that's what's happening, the DefaultServlet is handling the
> request, seeing that it is a PUT, and then complaining that it's
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Nicholas,
On 10/6/2011 10:08 PM, Nicholas Sushkin wrote:
> I now reconfigured DefaultServlet in conf/web.xml with
> readonly=false. Now, an unauthenticated PUT (with or without a
> body) returns 204 No Content instead of the login form. Seems like
> a
I now reconfigured DefaultServlet in conf/web.xml with readonly=false. Now, an
unauthenticated PUT (with or without a body) returns 204 No Content instead of
the login form. Seems like a bug. Should I add this behavior to Bug #51940 or
a new bug?
On Thursday, October 06, 2011 16:35:16 Nicholas
I found out that in Tomcat 6.0 trunk, if user is not authentication and app is
configured for FORM authentication, POST and GET requests return 200 and the
login form, but PUT returns 403 and error page. What might explain the
difference in handling PUT?
I tried to run in debugger, but it
https://issues.apache.org/bugzilla/show_bug.cgi?id=51940
I left all the flags at their default settings.
Thanks!
On Saturday, October 01, 2011 07:20:21 Mark Thomas wrote:
> On 30/09/2011 17:09, Nicholas Sushkin wrote:
> > Mark, Chris, thanks for the review.
> >
> >
> > Should filing a bug be m
On 30/09/2011 17:09, Nicholas Sushkin wrote:
> Mark, Chris, thanks for the review.
>
>
> Should filing a bug be my next step, then?
Please.
Mark
>
>
> On Friday, September 30, 2011 13:10:55 Mark Thomas wrote:
>
>> > Basically my thinking is that you handle POST, shouldn't you also
>
>> > i
Mark, Chris, thanks for the review.
Should filing a bug be my next step, then?
On Friday, September 30, 2011 13:10:55 Mark Thomas wrote:
> > Basically my thinking is that you handle POST, shouldn't you also
> > implement PUT the same way, to be consistent?
>
> I'd have no objection so the propos
On 30/09/2011 12:20, Nicholas Sushkin wrote:
> I can go into more details, if you wish, but basically I am using
> Forgerock OpenAM, which is a single signon/access manager product which
> has its own valve that hooks into the application's login URLs defined
> in form authenti
I can go into more details, if you wish, but basically I am using Forgerock
OpenAM, which is a single signon/access manager product which has its own
valve that hooks into the application's login URLs defined in form
authentication, returns a login form with prepopulated username and pas
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Nicholas,
On 9/29/2011 3:37 PM, Nicholas Sushkin wrote:
> In Tomcat 6, Form Authentication valve restores the original
> request after a POST with successful authentication and redirect is
> followed by the client's GET. In case of
In Tomcat 6, Form Authentication valve restores the original request after a
POST with successful authentication and redirect is followed by the client's
GET. In case of the POST, the valve also restores the original request's body.
However, it doesn't do that for a PUT. If I
2011/9/2 Mabry Tyson :
> Summary: When requiring form authentication, Tomcat responds to an
> unauthenticated GET request with a HTTP status code of 200 (OK) and the
> login page.
> I believe that to be in violation of the HTTP standards.
>
> The problem: Software makes a GE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jess,
On 9/1/2011 7:06 PM, Jess Holle wrote:
> So form-based authentication is an obnoxious mutt -- but a mutt
> that everyone seems to have fallen in love with.
>
> This isn't Tomcat's fault, however, and Tomcat is doing the normal
> thing by return
x27;t
one that could possibly be used by a login form or
2. Add some other custom header to your response. If it's not there
but you got a 200, then something hijacked the response -- quite
probably a login form.
--
Jess Holle
On 9/1/2011 5:49 PM, Mabry Tyson wrote:
Summary: When re
Summary: When requiring form authentication, Tomcat responds to an
unauthenticated GET request with a HTTP status code of 200 (OK) and the
login page.
I believe that to be in violation of the HTTP standards.
The problem: Software makes a GET request to a web server. It gets
back a 200
There is no limitation regarding special characters.
I just have to make sure and encode my query string properly.
Thanks,
-Original Message-
From: Konstantin Kolinko [mailto:knst.koli...@gmail.com]
Sent: Monday, March 14, 2011 12:22 PM
To: Tomcat Users List
Subject: Re: Form
...@christopherschultz.net]
Sent: Monday, March 14, 2011 1:33 PM
To: Tomcat Users List
Subject: Re: Form Authentication Illegal Characters
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Beau,
On 3/14/2011 10:57 AM, beau.hutche...@thomsonreuters.com wrote:
> Currently, authentication fails if
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Beau,
On 3/14/2011 10:57 AM, beau.hutche...@thomsonreuters.com wrote:
> Currently, authentication fails if the character # (pound sign) is
> contained within a username.
Define "fails".
- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (
2011/3/14 :
> Hello All:
>
> I am using Tomcat 6.0.26. My application has a context.xml file that
> defines an org.apache.catalina.authenticator.FormAuthenticator
>
> Valve and an org.apache.catalina.realm.DataSourceRealm Realm which I use
> for authentication.
>
> My login page functions in typic
Hello All:
I am using Tomcat 6.0.26. My application has a context.xml file that
defines an org.apache.catalina.authenticator.FormAuthenticator
Valve and an org.apache.catalina.realm.DataSourceRealm Realm which I use
for authentication.
My login page functions in typical FormAuthentication manner
h the userCredCol and userNameCol values. Therefore no password to check for.
Beau
-Original Message-
From: André Warnier [mailto:a...@ice-sa.com]
Sent: Friday, January 28, 2011 6:36 AM
To: Tomcat Users List
Subject: Re: Pid OpenSSO request for Tomcat Form Authentication that requires
no
Message-
> From: André Warnier [mailto:a...@ice-sa.com]
> Sent: Friday, January 28, 2011 6:36 AM
> To: Tomcat Users List
> Subject: Re: Pid OpenSSO request for Tomcat Form Authentication that requires
> no password for third party SSO
>
> Pid wrote:
>> On 1/27/11 3:57
[mailto:a...@ice-sa.com]
Sent: Friday, January 28, 2011 6:36 AM
To: Tomcat Users List
Subject: Re: Pid OpenSSO request for Tomcat Form Authentication that requires
no password for third party SSO
Pid wrote:
> On 1/27/11 3:57 PM, beau.hutche...@thomsonreuters.com wrote:
>> Chris:
>&
Pid wrote:
On 1/27/11 3:57 PM, beau.hutche...@thomsonreuters.com wrote:
Chris:
Thanks for your reply.
Currently I am using Tomcat 6.0.29
@Pid: Would you have any ideas on how to set something up like this?
What details are you providing to Tomcat?
If I read the thread correctly you've got
version? I ask because Tomcat 7 includes the Servlet 3.0
> programmatic login API.
>
>> After successfully logging into the partner app, I will be redirected
>> and only provided a username to log into my tomcat Form Authentication
>> app. I am using a DataSourceRealm to chec
Hi.
I think that you should be a bit more specific about the exact scheme below.
Can you describe exactly, step by step, what happens just before and "After successfully
logging into the partner app, I will be redirected
and only provided a username to log into my tomcat Form Authentic
Sent: Thursday, January 27, 2011 12:41 PM
To: Tomcat Users List
Subject: Re: Tomcat Form Authentication that requires no password for
third party SSO
You could implement your own authenticator,
extending the class org.apache.catalina.authenticator.AuthenticatorBase
https://svn.apache.org/viewvc/tomcat/tc
t: Re: Tomcat Form Authentication that requires no password for
third party SSO
You could implement your own authenticator,
extending the class org.apache.catalina.authenticator.AuthenticatorBase
https://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/catal
ina/authenti
application with an SSO partner application.
After successfully logging into the partner app, I will be redirected
and only provided a username to log into my tomcat Form Authentication
app. I am using a DataSourceRealm to check for both Users and User
Roles.
Are there any suggestions as to how I can
Subject: Re: Tomcat Form Authentication that requires no password for
third party SSO
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Beau,
On 1/26/2011 1:10 PM, beau.hutche...@thomsonreuters.com wrote:
> I am trying to integrate my application with an SSO partner
application.
What Tomcat vers
After successfully logging into the partner app, I will be redirected
> and only provided a username to log into my tomcat Form Authentication
> app. I am using a DataSourceRealm to check for both Users and User
> Roles.
DataSourceRealm requires both username and password. I think JAASRealm
m
Hello:
I am trying to integrate my application with an SSO partner application.
After successfully logging into the partner app, I will be redirected
and only provided a username to log into my tomcat Form Authentication
app. I am using a DataSourceRealm to check for both Users and User
Roles
scripting, why not just set a class or id on
> the body for each type, instead of the hidden div?
>
>
> p
>
>
>> Thanks
>>
>> Shaun
>>
>>
>> On Wed, Aug 25, 2010 at 10:17 PM, Christopher Schultz
>> wrote:
>> Shaun,
>>
>> On 8
;
> Shaun
>
>
> On Wed, Aug 25, 2010 at 10:17 PM, Christopher Schultz
> wrote:
> Shaun,
>
> On 8/23/2010 4:56 AM, Shaun Senecal wrote:
>>>> I'm using FORM authentication, and everything seems to be working
>>>> (logins are accepted, etc), except
login failure or not. Not pretty, but it works!
Thanks
Shaun
On Wed, Aug 25, 2010 at 10:17 PM, Christopher Schultz
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Shaun,
>
> On 8/23/2010 4:56 AM, Shaun Senecal wrote:
>> I'm using FORM authentication,
1 - 100 of 192 matches
Mail list logo