This is an automated email from the ASF dual-hosted git repository.

lprimak pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/shiro-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new a2a660f97 update
a2a660f97 is described below

commit a2a660f97c9c554c5fa4a8373c158f0d7714068b
Author: lprimak <[email protected]>
AuthorDate: Tue Jan 13 16:21:38 2026 -0600

    update
---
 .well-known/security.txt |  2 +-
 feed.xml                 |  2 +-
 security-model.html      |  2 +-
 web.html                 | 25 +++++++++++++++++++++++++
 4 files changed, 28 insertions(+), 3 deletions(-)

diff --git a/.well-known/security.txt b/.well-known/security.txt
index fe241863e..0c2d7cf41 100644
--- a/.well-known/security.txt
+++ b/.well-known/security.txt
@@ -1,5 +1,5 @@
 Contact: mailto:[email protected]
-Expires: 2027-01-13T22:06:37Z
+Expires: 2027-01-13T22:20:45Z
 Preferred-Languages: en
 Canonical: https://shiro.apache.org/.well-known/security.txt
 Policy: https://shiro.apache.org/security-reports.html
\ No newline at end of file
diff --git a/feed.xml b/feed.xml
index 65daa021f..dfd5f30d9 100644
--- a/feed.xml
+++ b/feed.xml
@@ -4,7 +4,7 @@
   <subtitle>Simple. Java. Security.</subtitle>
   <link href="https://shiro.apache.org/"/>
   <link rel="self" href="https://shiro.apache.org/feed.xml"; />
-  <updated>2026-01-13T22:06:37Z</updated>
+  <updated>2026-01-13T22:20:45Z</updated>
 
   <author>
     <name>Les Hazlewood</name>
diff --git a/security-model.html b/security-model.html
index 6c751c2e0..07ad67339 100644
--- a/security-model.html
+++ b/security-model.html
@@ -501,7 +501,7 @@ Operators should implement these controls at the 
application or infrastructure l
 <div class="ulist">
 <ul>
 <li>
-<p>Shiro&#8217;s cryptographic utilities are wrappers around standard Java 
cryptography (JCA/JCE).</p>
+<p>Shiro&#8217;s cryptographic utilities are wrappers around standard Java 
cryptography (JCA/JCE) and <code>BouncyCastle</code> libraries.</p>
 </li>
 <li>
 <p><strong>Algorithm Selection</strong>: Operators must choose appropriate 
algorithms. Avoid deprecated algorithms (MD5, SHA-1 for security purposes).</p>
diff --git a/web.html b/web.html
index 0d4f9c8ae..3cae5dacb 100644
--- a/web.html
+++ b/web.html
@@ -249,6 +249,7 @@
 <li><a href="#request_specific_enablingdisabling">Request-specific 
Enabling/Disabling</a></li>
 <li><a href="#path_specific_enablingdisabling">Path-specific 
Enabling/Disabling</a></li>
 <li><a href="#global_filters">Global Filters</a></li>
+<li><a href="#cors_support">CORS Support</a></li>
 <li><a href="#http_strict_transport_security_hsts">HTTP Strict Transport 
Security (HSTS)</a></li>
 </ul>
 </li>
@@ -991,6 +992,30 @@ invalidRequest.blockNonAscii = true
 </div>
 </div>
 <div class="sect2">
+<h3 id="cors_support">CORS Support</h3>
+<div class="paragraph">
+<p>When using HTTP-based authentication (like Basic Auth or Bearer Token) in a 
browser-based application, Cross-Origin Resource Sharing (CORS) pre-flight 
<code>OPTIONS</code> requests are often sent by the browser. By default, these 
requests might be rejected if they do not contain authentication headers.</p>
+</div>
+<div class="paragraph">
+<p>To allow pre-flight <code>OPTIONS</code> requests to pass through the 
authentication filter without requiring credentials, you can configure the 
<code>allowPreFlightRequests</code> property on any filter extending 
<code>HttpAuthenticationFilter</code>.</p>
+</div>
+<div class="paragraph">
+<p>This is commonly used with <code>authcBasic</code> (Basic Auth) or 
<code>authcBearer</code> (Bearer Token / JWT).</p>
+</div>
+<div class="listingblock">
+<div class="content">
+<pre class="highlightjs highlight"><code class="language-ini hljs" 
data-lang="ini">[main]
+...
+# Example 1: Configuring Basic Auth for CORS
+authcBasic.allowPreFlightRequests = true
+
+# Example 2: Configuring Bearer Auth (if used) for CORS
+authcBearer.allowPreFlightRequests = true
+...</code></pre>
+</div>
+</div>
+</div>
+<div class="sect2">
 <h3 id="http_strict_transport_security_hsts">HTTP Strict Transport Security 
(HSTS)</h3>
 <div class="paragraph">
 <p>The <a 
href="static/current/apidocs/shiro-web/org/apache/shiro/web/filter/authz/SslFilter.html">SslFilter</a>
 (and all of its subclasses) supports enabling/disabling HTTP Strict Transport 
Security (HSTS).</p>

Reply via email to