Author: markt Date: Fri Jul 22 12:09:13 2011 New Revision: 1149582 URL: http://svn.apache.org/viewvc?rev=1149582&view=rev Log: Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=41498 Add info for allRolesMode
Modified: tomcat/trunk/webapps/docs/changelog.xml tomcat/trunk/webapps/docs/config/realm.xml Modified: tomcat/trunk/webapps/docs/changelog.xml URL: http://svn.apache.org/viewvc/tomcat/trunk/webapps/docs/changelog.xml?rev=1149582&r1=1149581&r2=1149582&view=diff ============================================================================== --- tomcat/trunk/webapps/docs/changelog.xml (original) +++ tomcat/trunk/webapps/docs/changelog.xml Fri Jul 22 12:09:13 2011 @@ -109,6 +109,10 @@ <subsection name="Web applications"> <changelog> <fix> + <bug>41498</bug>: Add the allRolesMode attribute to the Realm + configuration page in the documentation web application. (markt) + </fix> + <fix> <bug>51516</bug>: Correct documentation web application to show correct system property name for changing the name of the SSO session cookie. (markt) Modified: tomcat/trunk/webapps/docs/config/realm.xml URL: http://svn.apache.org/viewvc/tomcat/trunk/webapps/docs/config/realm.xml?rev=1149582&r1=1149581&r2=1149582&view=diff ============================================================================== --- tomcat/trunk/webapps/docs/config/realm.xml (original) +++ tomcat/trunk/webapps/docs/config/realm.xml Fri Jul 22 12:09:13 2011 @@ -107,6 +107,19 @@ <attributes> + <attribute name="allRolesMode" required="false"> + <p>This attribute controls how the special role name <code>*</code> is + handled when processing authorization constraints in web.xml. By + default, the specification compliant value of <code>strict</code> is + used which means that the user must be assigned one of the roles defined + in web.xml. The alternative values are <code>authOnly</code> which means + that the user must be authenticated but no check is made for assigned + roles and <code>strictAuthOnly</code> which means that the user must be + authenticated and no check will be made for assigned roles unless roles + are defined in web.xml in which case the user must be assigned at least + one of those roles.</p> + </attribute> + <attribute name="connectionName" required="true"> <p>The database username to use when establishing the JDBC connection.</p> @@ -208,6 +221,19 @@ <attributes> + <attribute name="allRolesMode" required="false"> + <p>This attribute controls how the special role name <code>*</code> is + handled when processing authorization constraints in web.xml. By + default, the specification compliant value of <code>strict</code> is + used which means that the user must be assigned one of the roles defined + in web.xml. The alternative values are <code>authOnly</code> which means + that the user must be authenticated but no check is made for assigned + roles and <code>strictAuthOnly</code> which means that the user must be + authenticated and no check will be made for assigned roles unless roles + are defined in web.xml in which case the user must be assigned at least + one of those roles.</p> + </attribute> + <attribute name="dataSourceName" required="true"> <p>The name of the JNDI JDBC DataSource for this Realm.</p> </attribute> @@ -317,6 +343,19 @@ The default value is "false".</p> </attribute> + <attribute name="allRolesMode" required="false"> + <p>This attribute controls how the special role name <code>*</code> is + handled when processing authorization constraints in web.xml. By + default, the specification compliant value of <code>strict</code> is + used which means that the user must be assigned one of the roles defined + in web.xml. The alternative values are <code>authOnly</code> which means + that the user must be authenticated but no check is made for assigned + roles and <code>strictAuthOnly</code> which means that the user must be + authenticated and no check will be made for assigned roles unless roles + are defined in web.xml in which case the user must be assigned at least + one of those roles.</p> + </attribute> + <attribute name="alternateURL" required="false"> <p>If a socket connection can not be made to the provider at the <code>connectionURL</code> an attempt will be made to use the @@ -554,6 +593,19 @@ <attributes> + <attribute name="allRolesMode" required="false"> + <p>This attribute controls how the special role name <code>*</code> is + handled when processing authorization constraints in web.xml. By + default, the specification compliant value of <code>strict</code> is + used which means that the user must be assigned one of the roles defined + in web.xml. The alternative values are <code>authOnly</code> which means + that the user must be authenticated but no check is made for assigned + roles and <code>strictAuthOnly</code> which means that the user must be + authenticated and no check will be made for assigned roles unless roles + are defined in web.xml in which case the user must be assigned at least + one of those roles.</p> + </attribute> + <attribute name="resourceName" required="true"> <p>The name of the resource that this realm will use for user, password and role information.</p> @@ -583,6 +635,19 @@ <attributes> + <attribute name="allRolesMode" required="false"> + <p>This attribute controls how the special role name <code>*</code> is + handled when processing authorization constraints in web.xml. By + default, the specification compliant value of <code>strict</code> is + used which means that the user must be assigned one of the roles defined + in web.xml. The alternative values are <code>authOnly</code> which means + that the user must be authenticated but no check is made for assigned + roles and <code>strictAuthOnly</code> which means that the user must be + authenticated and no check will be made for assigned roles unless roles + are defined in web.xml in which case the user must be assigned at least + one of those roles.</p> + </attribute> + <attribute name="digest" required="false"> <p>The digest algorithm used to store passwords in non-plaintext formats. Valid values are those accepted for the algorithm name by the @@ -656,6 +721,19 @@ <attributes> + <attribute name="allRolesMode" required="false"> + <p>This attribute controls how the special role name <code>*</code> is + handled when processing authorization constraints in web.xml. By + default, the specification compliant value of <code>strict</code> is + used which means that the user must be assigned one of the roles defined + in web.xml. The alternative values are <code>authOnly</code> which means + that the user must be authenticated but no check is made for assigned + roles and <code>strictAuthOnly</code> which means that the user must be + authenticated and no check will be made for assigned roles unless roles + are defined in web.xml in which case the user must be assigned at least + one of those roles.</p> + </attribute> + <attribute name="appName" required="true"> <p>The name of the application as configured in your login configuration file --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org