Thanks!  I am not using CMA actually, it is JSP home-grown security,
which I am looking to replace.  
In your opinion, should I look use CMA or go with tynamo & shiro?
I guess I can do a bake-off but I would rather not.

On Jun 1, 2011, at 4:29 PM, Kalle Korhonen wrote:

> The big three for Java are CMA (Container Managed Authentication)
> which you are using, Spring Security (ex-Acegi Security, Tapestry
> integration provided by tapestry-spring-security module) and Apache
> Shiro (ex-JSecurity, Tapestry integration provided by Tynamo's
> tapestry-security). I've spent more time with all of them that I care
> to admit, and I've moved through them in that order in search of more
> flexible security framework that allows me to do what I want without
> getting in the way. Shiro is by no means perfect (which is why I
> signed up as a committer) but from my experience, by far the most
> flexible. For OpenId and Oauth there are several projects available
> and you can piecemeal it together to your home-grown security
> framework or CMA if you really wanted to, but I wouldn't recommend.
> 
> Kalle
> 
> 
> On Wed, Jun 1, 2011 at 12:40 PM, Lenny Primak <lpri...@hope.nyc.ny.us> wrote:
>> Thanks guys I'll definitely look at tynamo security.
>> There is a lot of homegrown code in our implementation that feels like it 
>> should be a part of a framework that's already been written. I guess that 
>> tynamo security is that framework.
>> 
>> Anything else I should be l should be looking at in this space?  Perhaps not 
>> necessarily tapestry related?
>> 
>> 
>> On Jun 1, 2011, at 2:11 PM, "Thiago H. de Paula Figueiredo" 
>> <thiag...@gmail.com> wrote:
>> 
>>> On Wed, 01 Jun 2011 14:33:47 -0300, Lenny Primak <lpri...@hope.nyc.ny.us> 
>>> wrote:
>>> 
>>>> My current project is to refresh a client's web site using tapestry. The 
>>>> web site currently uses JSP.  We have a JEE/web service backend that uses 
>>>> JPA/EJB3.1 which we will continue to use.
>>>> We now have a JEE based authorization service API based on plain method 
>>>> calls now.
>>>> What we want is to keep the current login scheme and add LDAP and possibly 
>>>> Facebook ID and openid.
>>> 
>>> For using Facebook ID and OpenID, check 
>>> http://tynamo.org/tynamo-federatedaccounts+guide. Beyond that, I can't see 
>>> why using the existing API in Tapestry would be different from your 
>>> existing code, besides that Tapestry templates don't allow code 
>>> (scriptlets). I'd suggest you to build some components to encapsulate 
>>> common scenarios (something like a IfUserHasPermission component), maybe a 
>>> couple mixins, and using the ComponentRequestFilter and/or RequestFilter 
>>> pipelines for cross-page logic.
>>> 
>>> --
>>> Thiago H. de Paula Figueiredo
>>> Independent Java, Apache Tapestry 5 and Hibernate consultant, developer, 
>>> and instructor
>>> Owner, Ars Machina Tecnologia da Informação Ltda.
>>> http://www.arsmachina.com.br
>>> 
>>> ---------------------------------------------------------------------
>>> To unsubscribe, e-mail: users-unsubscr...@tapestry.apache.org
>>> For additional commands, e-mail: users-h...@tapestry.apache.org
>>> 
>> 
>> 
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: users-unsubscr...@tapestry.apache.org
>> For additional commands, e-mail: users-h...@tapestry.apache.org
>> 
>> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tapestry.apache.org
> For additional commands, e-mail: users-h...@tapestry.apache.org
> 


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tapestry.apache.org
For additional commands, e-mail: users-h...@tapestry.apache.org

Reply via email to