> -----Original Message----- > From: David Jencks [mailto:[EMAIL PROTECTED] > > On Monday, January 5, 2004, at 04:20 AM, Alan D. Cabrera wrote: > >> <snip> > >> OK, this makes sense. However, there are a lot of levels of > >> indirection (lets assume there is only one realm): > >> > >> user --nXm-- principal --nxm--role --nxm-- method > >> > >> If there is only one realm and it is easy to specify the > principals > >> each user gets in the login system, it might be worthwhile to > >> provide a shortcut security mapping that equated roles and > >> principals. Does this make any sense? > > > > I'm not clear on what this shortcut security mapping is and > why it's > > needed. It kind of sounds like the principal/role mapping > that is in > > the deployment descriptor. > > My suggestion is a way to set up a simple principal/role mapping > easily: principal == role. > > I'm worried that your scheme may be hard to set up for simple > scenarios. > > The entire declarative security scheme is logically equivalent, IIUC, > to a single map > user --nxm-- method. > > Everything else is introduced to make administration and modification > easier. > Since users come and go frequently, the ejb model suggests at least > > user --nxm-- roles --nxm-- methods > > Your model further decomposes user --nxm- roles to user --nxm-- > principals --nxm-- roles.
I do this because LoginModules return principals and my implementation of JACC works w/ principals. Let me also state that the following is what is stored in the security mapping: principals --nxm-- roles --nxm-- methods The mapping of user --nxm-- principals is virtually done by the LoginModule. > I'm just suggesting that we > provide a way to > set up a trivial principal -- role mapping without explicitly listing > all the mapping elements. This would purely be for > convenience in case > someone wanted to, logically, directly assign roles to users. I think I understand now and agree that this is a useful case to support. Let me state how I understand this. We're looking to support trival principals --1x1-- roles --nxm-- methods where we have LoginModules that stuff trival principals into subjects, i.e. do the user --nxm-- trivial principals mapping. Off the top of my head, I think that the simplification should take place in the tool that creates the security descriptor so that it looks like roles --nxm-- methods to the deployer. What do you think? Did I make sense? Regards, Alan ---------------------------------------------------------------- Visit our Internet site at http://www.reuters.com Get closer to the financial markets with Reuters Messaging - for more information and to register, visit <http://www.reuters.com/messaging> Any views expressed in this message are those of the individual sender, except where the sender specifically states them to be the views of The Reuters Group.