[ 
https://issues.apache.org/jira/browse/ISIS-3305?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17647893#comment-17647893
 ] 

Andi Huber commented on ISIS-3305:
----------------------------------

>From a developer perspective there should be a simplified decision process 
>when selecting a security model for their application:
*A) Select your authenticator* (single choice):
 * default (Spring autoconfigure)
 * OAuth/OpenId
 * Keycloak
 * Bypass
 * Apache Shiro (optional, if easy to migrate)

*B) Select your authorizor* (single choice):
 * default (Spring autoconfigure)
 * SecMan (could be autoconfigured, that is, if its on the class-path, use it)
 * Bypass
 * Apache Shiro (optional, if easy to migrate)
 

> [DISCUSS] Re-platform on top of Spring security.
> ------------------------------------------------
>
>                 Key: ISIS-3305
>                 URL: https://issues.apache.org/jira/browse/ISIS-3305
>             Project: Isis
>          Issue Type: Task
>    Affects Versions: 2.0.0-M9
>            Reporter: Daniel Keir Haywood
>            Priority: Major
>             Fix For: 2.1.0
>
>
> as per [https://the-asf.slack.com/archives/CFC42LWBV/p1670661588201299]
>  
> Andi's wish list of changes is: 
>  # drop Shiro support
>  # drop Keycloak support
>  # instead fully integrate with Spring Security
>  # drop SudoService
>  # instead provide impersonation via a specialized login page
>  # drop Wicket's .../login, .../logout
>  # instead provide simple replacements under /security/... central to the 
> application (not using Wicket)
> Why? Focus on one security stack and do that integration well
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to