Re: TC security/impersonation question

2010-05-27 Thread Pid *
On 27 May 2010, at 00:06, Timothy Taylor securityaddi...@hotmail.com
wrote:

 Hi,
 Just a dumb question from a newbe but if I implement any type of
 security with TC then under what identity will the invoked WS stack
 object execute the request? Specifically, if I enable Kerberos
 authentication between the requesting application and TC does this
 guarantee the WS stack executes the requestor's request under the
 identity of the actual originating requestor?
 Much appreciated, Tim.

Tomcat doesn't know what the app is doing.  If you've implemented
container based security then any client must authenticate via the
relevant mechanism before requests are executed.

If the web services stack uses the current user principal (and roles)
somehow, then Tomcat will apply constraints accordingly.

Tomcat does not propagate auth info on in-app filesystem access, for
example.

p

 The New Busy think 9 to 5 is a cute idea. Combine multiple calendars
 with Hotmail. Get busy.
 _
 Hotmail is redefining busy with tools for the New Busy. Get more
 from your inbox.
 http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_2

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



RE: TC security/impersonation question

2010-05-27 Thread dB .
Tomcat doesn't do this, but on Windows it would certainly be possible to 
emulate the behavior that IIS provides in a Tomcat security filter. Upon return 
from doFilter it would RevertToSelf. I don't know what it means to do this on 
unix.

If you want to tell me more about your story/scenario and if it's worth 
it/interesting enough, I'd be glad to prototype something for Waffle 
(http://waffle.codeplex.com).

cheers
dB.

dB. @ dblock.org 
Moscow|Geneva|Seattle|New York



-Original Message-
From: Timothy Taylor [mailto:securityaddi...@hotmail.com] 
Sent: Wednesday, May 26, 2010 7:06 PM
To: users@tomcat.apache.org
Subject: RE: TC security/impersonation question



 


Hi,
Just a dumb question from a newbe but if I implement any type of security with 
TC then under what identity will the invoked WS stack object execute the 
request? Specifically, if I enable Kerberos authentication between the 
requesting application and TC does this guarantee the WS stack executes the 
requestor's request under the identity of the actual originating requestor?
Much appreciated, Tim.

 


The New Busy think 9 to 5 is a cute idea. Combine multiple calendars with 
Hotmail. Get busy.  
_
Hotmail is redefining busy with tools for the New Busy. Get more from your 
inbox.
http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_2
No virus found in this incoming message.
Checked by AVG - www.avg.com 
Version: 9.0.819 / Virus Database: 271.1.1/2899 - Release Date: 05/27/10 
02:25:00

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



RE: TC security/impersonation question

2010-05-26 Thread Timothy Taylor


 


Hi,
Just a dumb question from a newbe but if I implement any type of security with 
TC then under what identity will the invoked WS stack object execute the 
request? Specifically, if I enable Kerberos authentication between the 
requesting application and TC does this guarantee the WS stack executes the 
requestor's request under the identity of the actual originating requestor?
Much appreciated, Tim.

 


The New Busy think 9 to 5 is a cute idea. Combine multiple calendars with 
Hotmail. Get busy.  
_
Hotmail is redefining busy with tools for the New Busy. Get more from your 
inbox.
http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_2