diff --git a/docs/manual/src/docbook/authorization-common.xml b/docs/manual/src/docbook/authorization-common.xml
index 6f11b83c62..3d84559975 100644
--- a/docs/manual/src/docbook/authorization-common.xml
+++ b/docs/manual/src/docbook/authorization-common.xml
@@ -154,8 +154,7 @@ boolean supports(Class clazz);
ConfigAttribute starting with ROLE_, the
RoleVoter will vote to deny access. If no
ConfigAttribute begins with ROLE_, the voter
- will abstain. RoleVoter is case sensitive on comparisons as well as
- the ROLE_ prefix.
+ will abstain. The comparisons of attributes and
Custom Voters
@@ -190,22 +189,17 @@ boolean supports(Class clazz);
that integrate with its ACL capabilities.
illustrates Spring Security's
AfterInvocationManager and its concrete implementations.
- After Invocation Implementation
-
-
+ xml:id="authz-after-invocation">After Invocation
+ Implementation
-
-
-
+
Like many other parts of Spring Security, AfterInvocationManager has a
single concrete implementation, AfterInvocationProviderManager, which polls
a list of AfterInvocationProviders. Each
AfterInvocationProvider is allowed to modify the return object or throw
an AccessDeniedException. Indeed multiple providers can modify the object,
- as the result of the previous provider is passed to the next in the list. Let's now consider
- our ACL-aware implementations of AfterInvocationProvider.
+ as the result of the previous provider is passed to the next in the list.
Please be aware that if you're using AfterInvocationManager, you will
still need configuration attributes that allow the
MethodSecurityInterceptor's
@@ -222,9 +216,8 @@ boolean supports(Class clazz);
AccessDecisionVoter will vote to grant access for. This
latter (recommended) approach is usually achieved through a ROLE_USER or
ROLE_AUTHENTICATED configuration attribute.
-
-
-
-