DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUGĀ· RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://issues.apache.org/bugzilla/show_bug.cgi?id=42952>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED ANDĀ· INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=42952 ------- Additional Comments From [EMAIL PROTECTED] 2007-08-03 01:49 ------- (In reply to comment #15) > (In reply to comment #13) > > > this patch introduces two special cases: > > * the "visit" role is used by the PolicyAuthorizer to grant access to pages > > * the "users" group is given visit rights and is presented as "default > > group" > > in the addUser usecase. > > Do these have to be added to each publication manually? the visit role yes. but currently, all roles have to be added manually, as well as a workflow, so that does not count against the approach imho. the users group is a convenience thing that users could do without if they want. i'd like to add a default="yes" attribute to the gml file grammar, and new users will be in that group unless the admin explicitly untags a checkbox in addUser.jx. gets rid of the hardcoded stuff. wdyt? > > this is ugly. but it could be remedied with a new "pseudo-usecase": > > ac.visit. > > it doesn't do anything, but it has roles attached to it via > > usecase-policies.xml, and the policyAuthorizer could maybe delegate the role > > checking to the usecaseAuthorizer. gets rid of the hardcoded visit > > semantics. > > that leaves the default group. it could be made configurable in the gui > > (thus > > putting the semantics into the publication, where they belong), or we could > > introduce a new accreditable <anyUser/> that includes all authenticated > > users. > > probably easier to maintain than an extra group... > > Well, I have to admit that the ac.visit pseudo-usecase doesn't sound more > appealing than the current implementation ... I guess I'd even prefer the > visit > role + default group approach. But maybe it needs a bit more of discussion. Is > it really necessary to tackle this before 2.0? actually, i find the usecase idea quite appealing - basically it means that users can define a "visit" policy for ac.visit using an existing mechanism, and the policy authorizer uses that policy. not too quirky imho. we can even implement a real ac.visit as a document usecase... right now, the policy authorizer does not implement a policy for viewing pages, and i consider that a blocker bug - it opens up security holes whenever somebody tries to do something clever with our otherwise nice role and permission model. -- Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
