Shawn (Arkansas),

We definitely need #2 and #3 below ... we're working towards integrating JavaEE security annotations into our back-end Fortress servers. Once we've got all the pieces working (against our infrastructure), we'd be happy to share any of the code that's useful with Realm. I'm intrigued by Kiran's comment about using SAML for SSO ... I should also point out that we're using OAuth2 and JWT so that we can secure our REST resources via Fortress (RBAC) as well.

Our SSO system provides the X-REMOTE-USER and X-REMOTE-REALM headers if the user's authentication has already been performed (and hasn't timed out). This makes our front-end pretty specific and actually hampers the whole Fortress integration a bit. We're using Cosign for local users and Shibboleth for remote (federated) users.

Thanks for all the hard work you've put into Fortress!

Steve

On 06/01/2015 09:08 AM, Shawn McKinney wrote:
Hello,

This posting is to inform the community of the status of the fortress product 
and give hints as to future direction.

Current Status of Fortress product:
1. Fortress fully implements ANSI RBAC (INCITS 359).
2. Fortress provides an SDK, Web UI, Restful component and Tomcat security 
plug-ins

Next steps:
1. Add support for RFC2307bis which provides UNIX security capabilities (core, 
rest, web)
2. Add support for SSO (new component)
3. Add support for annotation-based policy enforcement in Java EE components 
(realm)
4. Add support for attribute-based access control (core, rest, web)

This is a community-driven product.  It makes no sense to add capabilities that 
are not necessary or otherwise won’t be used.  So, if this list does not look 
right to you, with elements either missing or misplaced - let us know what you 
think.

Best,

Shawn
[email protected]




--
--

"The pen is mightier than the sword if the sword is very short, and the pen is very 
sharp." — Terry Pratchett (RIP 2015)

Reply via email to