|
|
|
|
@ -156,7 +156,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
@@ -156,7 +156,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|
|
|
|
filter chain entirely. It's not clear how or if additional filter order customization should be implemented (other |
|
|
|
|
than by allowing Ids to be set on the various child elements). Channel security should be straightforward. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
* Method Security |
|
|
|
|
|
|
|
|
|
An example use of the \<security:intercept-methods /\> decorator is: |
|
|
|
|
@ -192,7 +192,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
@@ -192,7 +192,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|
|
|
|
|
|
|
|
|
** FilterChainProxy Configuration |
|
|
|
|
|
|
|
|
|
The \<security:filter-chain-map /\> decorator sets the configuration map of paths to filter lists for FilterChainProxy. The |
|
|
|
|
The \<security:filter-chain-map /\> decorator sets the configuration map of paths to filter lists for FilterChainProxy. The |
|
|
|
|
syntax is similar to that described above for the HTTP security features. |
|
|
|
|
|
|
|
|
|
+----------------------------------------------------------------------------------------------------------------------- |
|
|
|
|
@ -207,7 +207,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
@@ -207,7 +207,7 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|
|
|
|
</bean> |
|
|
|
|
|
|
|
|
|
+----------------------------------------------------------------------------------------------------------------------- |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
This kind of functionality can be added as requested/required without having an impact on other areas, so it is of |
|
|
|
|
lower priority than the design of "higher-level" namespace components. |
|
|
|
|
|
|
|
|
|
@ -220,10 +220,15 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
@@ -220,10 +220,15 @@ http://www.springframework.org/schema/security http://www.springframework.org/sc
|
|
|
|
|
element is an excellent example of the use of high-level namespace components. It can be used to set up a complete |
|
|
|
|
LDAP authentication provider with or without an external server. |
|
|
|
|
The optional <<<url>>> attribute specifies the URL of an external LDAP server. Without this, it will create |
|
|
|
|
an embedded Apache Directory instance and attempt to load any ldif files found on the classpath. Doing this |
|
|
|
|
an embedded Apache Directory server instance and attempt to load any ldif files found on the classpath. Doing this |
|
|
|
|
with Spring beans would involve potentially hundreds of lines of configuration and is a difficult task for an |
|
|
|
|
inexperienced user. Ultimately the user should be able to configure authentication and group membership strategy, |
|
|
|
|
server details (e.g. port number) and the structure of the directory. |
|
|
|
|
inexperienced user (or indeed any user). Ultimately the user should be able to configure authentication and group |
|
|
|
|
membership strategy, server details (e.g. port number) and the structure of the directory. |
|
|
|
|
|
|
|
|
|
{{{http://acegisecurity.svn.sourceforge.net/svnroot/acegisecurity/spring-security/trunk/core/src/main/java/org/springframework/security/config/LdapBeanDefinitionParser.java}LdapBeanDefinitionParser}} |
|
|
|
|
does the parsing work here and there are currently no child elements. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|