>Hi, >Do you read JAAS documentation ? Just started ;-).
>I recomend to do it, it well documented and has examples. >Don't understand me wrong, It is very good to implement Acl >and it is possible to reuse Acl implementation for JAAS >based security implementation. I will look at it. TIA for the tip. I have in the moment some private stress. I hope I'll back in the code soon... ~Gerhard ----------------------------------- Boren's Law: When in doubt, mumble. ----------------------------------- >> Juozas, >> >> >As I understand you are working on security. >> >> ;) I try. Some questions: >> Acl => List which holds to each Principal a Set of AclEntry's >> AclEntry => entry in an Access Control List >> Permission => used to grant a particular type of access >> to a resource >> Principal => used to represent any entity, such as an >> individual, a corporation, and a login id. >> >> For me the Acl is a simple Hashmap, which holds for each >> Prinicpal a Set of AclEntry's. Key is the Principal and >> value is a Set of AclEntry's. >> There are two AclEntry with one READ and one WRITE Permission. >> >> In our case each Acl contains ony one AclEntry for an Principal, >> either READ or WRITE . -- To unsubscribe, e-mail: <mailto:[EMAIL PROTECTED]> For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>
