Hi Tim,

Good suggestion! I'll look into it. I am in a situation where I'll prefer to
work on my own than to bother IT with LDAP role setup and subsequent access
granting to users. By having a JDBC Realm with a blacklist of users, I can
easily control the access.

I'll probably dig into the filter but I don't know java.. Any sample working
code with comments to modify would be great!


Thanks,
Clement

On Thu, Jun 25, 2009 at 2:59 AM, Tim Funk <funk...@apache.org> wrote:

> If you want a black list - it would probably be easier to write a filter
> [programmatic security] instead of declarative security. [At a minimum,
> everyone would still need to be authenticated - its the authorization which
> is done via the filter (actually the filter will defer to the realm so there
> isn't much extra work)]
>
> Ex:
> doFilter(req, resp, chain) {
>  if (req.isUserInRole("blacklist")) {
>    response.sendError(403);
>    return;
>  }
>  chain.doFilter(...);
> }
>
>
>
> -Tim
>
>
> Clement Chong wrote:
>
>> Hi Tim,
>>
>> Basically the first realm contains list of users we want to deny access.
>> The
>> password would be dynamic, making it difficult to get through. Well, maybe
>> I
>> should really consider working with specific roles. That is, grant users
>> with roles that would allow them access. Then I would probably just need a
>> single realm for authentication.
>>
>> However, this would mean almost all users require such a role granted
>> except
>> for some whom we like deny access. Then every new users would also
>> probably
>> need granted the role. A little extra work there, besides working with IT
>> to
>> get the new role setup.. A black list would work better than a white list
>> in
>> this case.
>>
>>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>

Reply via email to