Author: tripod
Date: Wed Nov 20 07:47:04 2013
New Revision: 1543725

URL: http://svn.apache.org/r1543725
Log:
OAK-791 UserManagement: Document changes wrt Jackrabbit 2

Modified:
    jackrabbit/oak/trunk/oak-doc/src/site/markdown/differences_user.md

Modified: jackrabbit/oak/trunk/oak-doc/src/site/markdown/differences_user.md
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-doc/src/site/markdown/differences_user.md?rev=1543725&r1=1543724&r2=1543725&view=diff
==============================================================================
--- jackrabbit/oak/trunk/oak-doc/src/site/markdown/differences_user.md 
(original)
+++ jackrabbit/oak/trunk/oak-doc/src/site/markdown/differences_user.md Wed Nov 
20 07:47:04 2013
@@ -14,9 +14,262 @@
    See the License for the specific language governing permissions and
    limitations under the License.
   -->
-### User Management : Differences wrt Jackrabbit 2.x
+## User Management : Differences to Jackrabbit 2.x
+### 1. Characteristics of the Default Implementation
+The default user management implementation present with OAK always stores 
user/group information in the workspace associated with the editing Session 
(see Jackrabbit 2.x `UserPerWorkspaceUserManager`). The implementation of a 
user management variant corresponding to Jackrabbit's default `UserManagerImpl` 
is blocked by missing workspace handling (see [OAK-118]). The current user 
manager has the following characteristics that differ from the corresponding 
Jackrabbit implementation:
 
-*NOTE: Work in Progress*
+#### General
+* Changes made to the user management API are always transient and require 
`Session#save()` to be persisted.
+* In case of a failure `Session#refresh` is no longer called in order to 
prevent reverting other changes unrelated to the user management operation. 
Consequently it's the responsibility of the API consumer to specifically revert 
pending or invalid transient modifications.
+* The implementation is no longer built on top of the JCR API but instead 
directly acts on `Tree` and `PropertyState` defined by the OAK API. This move 
allows to make use of the user management API within the OAK layer (aka SPI).
 
-Refer to [OAK-791](https://issues.apache.org/jira/browse/OAK-791) for a 
general overview of changes
-with respect to Jackrabbit 2.
+#### User/Group Creation
+* The `rep:password` property is no longer defined to be mandatory. Therefore 
a new user might be created without specifying a password. Note however, that 
`User#changePassword` does not allow to remove the password property.
+* `UserManager#createGroup(Principal)` will no longer generate a groupID in 
case the principal name collides with an existing user or group ID. This has 
been considered redundant as the Jackrabbit API in the mean time added 
`UserManager#createGroup(String groupID)`.
+* Since OAK is designed to scale with flat hierarchies the former 
configuration options `autoExpandTree` and `autoExpandSize` are no longer 
supported.
+
+#### Handling of the Authorizable ID
+* As of OAK the node type definition of `rep:Authorizable` defines a new 
property `rep:authorizableId` which is intended to store the ID of a user or 
group.
+* The default implementation comes with a dedicated property index for 
`rep:authorizableId` which asserts the uniqueness of that ID.
+* `Authorizable#getID` returns the string value contained in 
`rep:authorizableID` and for backwards compatibility falls back on the node 
name in case the ID property is missing.
+* The name of the authorizable node is generated based on a configurable 
implementation of the `AuthorizableNodeName` interface (see configuration 
section below). By default it uses the ID as name hint and includes a 
conversion to a valid JCR node name.
+
+#### equals() and hashCode() for Authorizables
+The implementation of `Object#equals()` and `Object#hashCode()` for user and 
groups slightly differs from Jackrabbit 2.x. It no longer relies on the 
_sameness_ of the underlaying JCR node but only compares IDs and the user 
manager instance.
+
+#### The _everyone_ Group
+As in Jackrabbit 2.x the OAK implementation contains special handling for the 
optional group corresponding to the `EveryonePrincipal` which always contains 
all Authorizable as member. As of OAK this fact is consistently reflected in 
all group membership related methods.
+
+#### Query
+
+TODO: [OAK-949]
+
+#### Autosave Behavior
+Due to the nature of the UserManager (see above) we decided to drop the 
auto-save behavior in the default implementation present with OAK. Consequently,
+
+* `UserManager#autoSave(boolean)` throws 
`UnsupportedRepositoryOperationException`
+* `UserManager#isAutoSave()` always returns `false`
+
+See also `PARAM_SUPPORT_AUTOSAVE` below; while this should not be needed if 
application code has been written against the Jackrabbit API (and thus testing 
if auto-save mode is enabled or not) this configuration option can be used as 
last resort.
+
+#### XML Import
+As of OAK 1.0 user and group nodes can be imported both with Session and 
Workspace import. The difference compare to Jackrabbit 2.x are listed below:
+
+* Importing an authorizable to another tree than the configured user/group 
node will only failed upon save (-> see `UserValidator` during the 
`Root#commit`). With Jackrabbit 2.x core it used to fail immediately.
+* NEW: The `BestEffort` behavior is now also implemented for the import of 
impersonators (was missing in Jackrabbit /2.x).
+* NEW: Workspace Import
+
+#### Group Membership
+With the default configuration Jackrabbit 2.x stores the group members as 
_weak references_ in a `rep:members` multi value property in the group node. If 
the `groupMembershipSplitSize` configuration parameter is set and valid, the 
group memberships are collected in a node structure below `rep:members` instead 
of the default multi valued property. Its value determines the maximum number 
of member properties until additional intermediate nodes are inserted. Valid 
parameter values are integers > 4. The node structure is a balanced b-tree 
where only the leave nodes carry the actual values in residual properties which 
name is the principal name of the member. 
+
+**NOTE**: The following section is not valid until [OAK-482] is fixed.
+
+As of **Oak** the user manager automatically chooses an appropriate storage 
structure depending on the number of group members. If the number of members is 
low they are store as _weak references_ in a `rep:members` multi value 
property. This is similar to Jackrabbit 2.x. If the number of members is high 
the user manager will create an intermediate node list to reduce the size of 
the multi value properties below a `rep:membersList` node.
+
+##### Related node types
+    [rep:Group] > rep:Authorizable, rep:Members
+      + rep:membersList (rep:MembersList) = rep:MembersList protected VERSION
+
+    [rep:MembersList]
+      + * (rep:Members) = rep:Members protected COPY
+
+    [rep:Members]
+      - rep:members (WEAKREFERENCE) protected multiple < 'rep:Authorizable'
+
+##### Example Group with few members
+*(irrelevant properties excluded)*
+
+    {
+        "jcr:primaryType": "rep:Group",
+        "rep:principalName": "contributor",
+        "rep:members": [
+            "429bbd5b-46a6-3c3d-808b-5fd4219d5c4d",
+            "ca58c408-fe06-357e-953c-2d23ffe1e096",
+            "3ebb1c04-76dd-317e-a9ee-5164182bc390",
+            "d3c827d3-4db2-30cc-9c41-0ed8117dbaff",
+            "f5777a0b-a933-3b4d-9405-613d8bc39cc7",
+            "fdd1547a-b19a-3154-90da-1eae8c2c3504",
+            "65c3084e-abfc-3719-8223-72c6cb9a3d6f"
+        ]
+    }
+
+##### Example Group with many members
+*(irrelevant properties excluded)*
+
+    {
+        "jcr:primaryType": "rep:Group",
+        "rep:principalName": "employees",
+        "rep:membersList": {
+            "jcr:primaryType": "rep:MembersList",
+            "0": {
+                "jcr:primaryType": "rep:Members",
+                "rep:members": [
+                    "429bbd5b-46a6-3c3d-808b-5fd4219d5c4d",
+                    "ca58c408-fe06-357e-953c-2d23ffe1e096",
+                    ...
+                ]
+            },
+            ...
+            "341": {
+                "jcr:primaryType": "rep:Members",
+                "rep:members": [
+                    "fdd1547a-b19a-3154-90da-1eae8c2c3504",
+                    "65c3084e-abfc-3719-8223-72c6cb9a3d6f",
+                    ...
+                ]
+            }
+        }
+    }
+
+
+
+
+*Note*: The exact threshold value that determines the storage strategy is an 
implementation detail and might even vary depending on the underlying 
persistence layer.
+
+### 2. Builtin Users
+The setup of builtin user and group accounts is triggered by the configured 
`WorkspaceInitializer` associated with the user management configuration (see 
Configuration section below). 
+
+The default user management implementation in OAK comes with an initializer 
that creates the following builtin user accounts (as in Jackrabbit 2.x):
+
+#### Administrator User
+The admin user is always being created. The ID of this user is retrieved from 
the user configuration parameter `PARAM_ADMIN_ID`, which defaults to `admin`.
+ 
+As of OAK 1.0 however the administrator user might be created without initial 
password forcing the application to set the password upon start (see 
`PARAM_OMIT_ADMIN_PW` configuration parameter).
+
+#### Anonymous User
+In contrast to Jackrabbit 2.x the anonymous (or guest) user is optional. 
Creation will be skipped if the value of the `PARAM_ANONYMOUS_ID` configuration 
parameter is `null` or empty.
+ 
+Note, that the anonymous user will always be created without specifying a 
password in order to prevent login with SimpleCredentials. 
+
+The proper way to obtain a guest session is (see also [OAK-793]):
+
+    Repository#login(new GuestCredentials(), wspName);
+
+### 3. Authorizable Actions
+The former internal interface `AuthorizableAction` has been slightly adjusted 
to match OAK requirements and is now part of the public OAK SPI interfaces. In 
contrast to Jackrabbit-core the AuthorizableAction(s) now operate directly on 
the OAK API which eases the handling of implementation specific tasks such as 
writing protected items.
+
+The example implementations of the `AuthorizableAction` interface present with 
OAK match the implementations available with Jackrabbit 2.x:
+
+* `AccessControlAction`: set up permission for new authorizables
+* `PasswordAction`: simplistic password verification upon user creation and 
password modification
+* `PasswordChangeAction`: verifies that the new password is different from the 
old one
+* `ClearMembershipAction`: clear group membership upon removal of an 
authorizable.
+
+As in jackrabbit core the actions are executed with the editing session and 
the target operation will fail if any of the configured actions fails (e.g. due 
to insufficient permissions by the editing OAK ContentSession).
+
+In order to match the OAK repository configuration setup and additional 
interface AuthorizableActionProvider has been introduced. See section 
Configuration below.
+
+### 4. Node Type Definitions
+The built-in node types related to user management tasks have been modified as 
follows:
+
+**TODO**: sync with membership section above
+
+    [rep:Authorizable] > mix:referenceable, nt:hierarchyNode
+      abstract
+      + * (nt:base) = nt:unstructured VERSION
+      - rep:principalName  (STRING) protected mandatory
+      - rep:authorizableId (STRING) protected /* @since oak 1.0 */
+      - * (UNDEFINED)
+      - * (UNDEFINED) multiple
+    
+    [rep:Members]
+      orderable
+      + * (rep:Members) = rep:Members protected multiple /* FIXME: SNS 
definition */
+      - * (WEAKREFERENCE) protected < 'rep:Authorizable' /* FIXME: OAK-482 */
+
+### 5. API Extensions
+The OAK project introduces the following user management related public
+interfaces and classes:
+
+* `org.apache.jackrabbit.oak.spi.security.user.*`
+    <dl>
+    <dt>
+        `AuthorizableNodeName`
+    </dt>
+    <dd>
+        Defines the generation of the authorizable node names in 
+        case the user management implementation stores user information in the 
repository.
+    </dd>
+    <dt>
+        `AuthorizableType`
+    </dt>
+    <dd>
+        Ease handling with the different authorizable types.
+    </dd>
+    <dt>
+        `UserConstants`
+    </dt>
+    <dd>
+        Constants (NOTE: OAK names/paths)
+    </dd>
+    </dl>
+    
+* `org.apache.jackrabbit.oak.spi.security.user.action.*`
+    <dl>
+    <dt>
+        `AuthorizableAction`
+    </dt>
+    <dd>
+        (see above)
+    </dd>
+    <dt>
+        `AuthorizableActionProvider`
+    </dt>
+    <dd>
+        (see above)
+    </dd>
+    </dl>
+
+* `org.apache.jackrabbit.oak.spi.security.user.util.*`
+    <dl>
+    <dt>
+        `PasswordUtil`
+    </dt>
+    <dd>
+       Utilities for password generation. This utility corresponds to the
+       internal jackrabbit utility. As of OAK it also supports Password-Based 
Key
+       Derivation Function 2 (PBKDF2) function for password generation.
+    </dd>
+    <dt>
+        `UserUtil`
+    </dt>
+    <dd>
+        Utilities related to general user management tasks.
+    </dd>
+    </dl>
+
+### 6. Configuration
+* User Configuration []
+    * getUserManager: Obtain a new user manager instance
+    * getAuthorizableActionProvider: Obtain a new instance of the 
AuthorizableActionProvider (see above)
+
+#### Configuration Parameters supported by the default implementation
+
+| Parameter                           | Type    | Default                      
                |
+|-------------------------------------|---------|----------------------------------------------|
+| `PARAM_ADMIN_ID`                    | String  | "admin"                      
                |
+| `PARAM_OMIT_ADMIN_PW`               | boolean | false                        
                |
+| `PARAM_ANONYMOUS_ID`                | String  | "anonymous" (nullable)       
                |
+| `PARAM_USER_PATH`                   | String  | 
"/rep:security/rep:authorizables/rep:users"  |
+| `PARAM_GROUP_PATH`                  | String  | 
"/rep:security/rep:authorizables/rep:groups" |
+| `PARAM_DEFAULT_DEPTH`               | int     | 2                            
                |
+| `PARAM_GROUP_MEMBERSHIP_SPLIT_SIZE` | int     |                              
                |
+| `PARAM_PASSWORD_HASH_ALGORITHM`     | String  | "SHA-256"                    
                |
+| `PARAM_PASSWORD_HASH_ITERATIONS`    | int     | 1000                         
                |
+| `PARAM_PASSWORD_SALT_SIZE`          | int     | 8                            
                |
+| `PARAM_AUTHORIZABLE_NODE_NAME`      | AuthorizableNodeName | 
AuthorizableNodeName#DEFAULT    |
+| `PARAM_SUPPORT_AUTOSAVE`            | boolean | false                        
                |
+
+The following configuration parameters present with the default implementation 
in Jackrabbit 2.x are no longer supported and will be ignored:
+
+* "compatibleJR16"
+* "autoExpandTree"
+* "autoExpandSize"
+
+
+
+<!-- hidden references -->
+[OAK-118]: https://issues.apache.org/jira/browse/OAK-118
+[OAK-482]: https://issues.apache.org/jira/browse/OAK-482
+[OAK-793]: https://issues.apache.org/jira/browse/OAK-793
+[OAK-949]: https://issues.apache.org/jira/browse/OAK-949
\ No newline at end of file


Reply via email to