Hi, I started to implement mappings and xml metadata, I will generate parsers at this time, we will use some better xml parsing tools later. > >Hi, > >Do you read JAAS documentation ? > > Just started ;-). > > >I recomend to do it, it well documented and has examples. > >Don't understand me wrong, It is very good to implement Acl > >and it is possible to reuse Acl implementation for JAAS > >based security implementation. > > I will look at it. TIA for the tip. > I have in the moment some private stress. I hope I'll back > in the code soon... > > ~Gerhard > > ----------------------------------- > Boren's Law: When in doubt, mumble. > ----------------------------------- > > >> Juozas, > >> > >> >As I understand you are working on security. > >> > >> ;) I try. Some questions: > >> Acl => List which holds to each Principal a Set of AclEntry's > >> AclEntry => entry in an Access Control List > >> Permission => used to grant a particular type of access > >> to a resource > >> Principal => used to represent any entity, such as an > >> individual, a corporation, and a login id. > >> > >> For me the Acl is a simple Hashmap, which holds for each > >> Prinicpal a Set of AclEntry's. Key is the Principal and > >> value is a Set of AclEntry's. > >> There are two AclEntry with one READ and one WRITE Permission. > >> > >> In our case each Acl contains ony one AclEntry for an Principal, > >> either READ or WRITE . > > > -- > To unsubscribe, e-mail: <mailto:[EMAIL PROTECTED]> > For additional commands, e-mail: <mailto:[EMAIL PROTECTED]> >
-- To unsubscribe, e-mail: <mailto:[EMAIL PROTECTED]> For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>
