Aaron Mulder wrote, On 8/18/2005 4:13 PM:

        So in the security settings, each login module has a login domain
name.  This is so that a single realm could distinguish between principles
(with the same name) from two login modules of the same class.  For
example, if you have two LDAP login modules pointing to different servers,
you could distinguish based on principal class and login domain name so
"administrator" from server A is different than "administrator" from
server B.

However, in our role mapping, we let you specify a realm, principal class, and principal name, but not a login domain name. In other words, all LDAP-group-administrator entries look the same, regardless of which server they originate from.

        I think the mapping should have a login-domain-name attribute on
the "principal" XML type.  I'd say it should be optional so you only have
to use it if you care to distinguish (it would be obnoxious to need to specify it every time). We could also do this with another surrounding element like (but within) "realm" -- I guess I don't care all that much either way.

What I don't have a handle on is the changes required to our security processing infrastructure to make this work. I'm not sure whether or how the login domain name propogates on the principals we create, though I have a vague memory that the principal wrappers were going to hold the login domain names.

        Does this sound familiar to anyone?  David J?  Alan?
The realm is a holdover from when login domains used to be called login realms. I imagine that there was some confusion during one of the updates and it ended up actually being a realm. From our discussions on IRC, I believe that we need to allow scoping of the principal to optionally include both the realm and login domain. The reason for "adding" the realm is that login domains may be shared by security realms; it would be nice to be able to keep the name of the login domains the same to keep things tractable.


Regards,
Alan



Reply via email to