Acegi 1.0.4
1.0.4
Copyright (c) 2004, 2005, 2006 - Ben Alex
Table of Contents
Preface ............................................................................................................................................. v I. Overall Architecture...................................................................................................................... 6 1. Introduction .......................................................................................................................... 7 1.1. What is Acegi Security? ............................................................................................. 7 1.2. History...................................................................................................................... 8 1.3. Release Numbering .................................................................................................... 9 2. Technical Overview ............................................................................................................ 10 2.1. Runtime Environment .............................................................................................. 102.2. Shared Components .................................................................................................. 10 2.3. Authentication ......................................................................................................... 12 2.4. Secure Objects ......................................................................................................... 13 2.5.Conclusion .............................................................................................................. 15 3. Supporting Infrastructure ..................................................................................................... 16 3.1. Localization ............................................................................................................. 16 3.2.Filters ...................................................................................................................... 16 4. Channel Security ................................................................................................................. 20 4.1. Overview .................................................................................................................20 4.2. Configuration ........................................................................................................... 20 4.3. Conclusion .............................................................................................................. 21 5. Tag Libraries...................................................................................................................... 23 5.1. Overview ................................................................................................................. 23 5.2. Configuration ........................................................................................................... 23 5.3. Usage...................................................................................................................... 23 II. Authentication ............................................................................................................................ 24 6. Common Authentication Services ........................................................................................ 25 6.1. Mechanisms, Providers and Entry Points................................................................... 25 6.2. UserDetails and Associated Types ............................................................................. 27 6.2.1. In-Memory Authentication ............................................................................. 28 6.2.2. JDBC Authentication ..................................................................................... 28 6.3. Concurrent Session Handling...
Regístrate para leer el documento completo.