>Hi,
>Do you read JAAS documentation ?

Just started ;-).

>I recomend to do it, it well documented and has examples.
>Don't understand me wrong, It is very good to implement Acl
>and it is possible to reuse Acl implementation for JAAS
>based security implementation.

I will look at it. TIA for the tip.
I have in the moment some private stress. I hope I'll back 
in the code soon...

   ~Gerhard
 
-----------------------------------
Boren's Law: When in doubt, mumble. 
-----------------------------------

>> Juozas, 
>> 
>> >As I understand you are working on security.
>> 
>> ;) I try. Some questions:
>> Acl => List which holds to each Principal a Set of AclEntry's
>> AclEntry => entry in an Access Control List 
>> Permission => used to grant a particular type of access 
>> to a resource
>> Principal => used to represent any entity, such as an 
>> individual, a corporation, and a login id.
>> 
>> For me the Acl is a simple Hashmap, which holds for each
>> Prinicpal a Set of AclEntry's. Key is the Principal and
>> value is a Set of AclEntry's.
>> There are two AclEntry with one READ and one WRITE Permission.
>> 
>> In our case each Acl contains ony one AclEntry for an Principal,
>> either READ or WRITE .


--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to