The basic goal is to keep people from walking through id's of objects
passed as params.  The realm is built to handle all of the
authorization, I just would like to keep as little as possible in the
session and prevent redundant checking against the persistent source.

| -----Original Message-----
| From: Phil Steitz [mailto:[EMAIL PROTECTED]]
| Sent: Friday, September 06, 2002 2:41 PM
| To: Struts Users Mailing List
| Subject: Re: [OT] Request Certificates/Security
| 
| Jacob,
| 
| Assuming that you have exhausted *all* means to solve your
authorization
| problems using container-managed security, which would eliminate the
| need to muck with security tokens, here are some comments on your
setup:
| 
| 1. Use a secure session cookie to carry the security token.  You
should
| keep this stuff out of the queryString.
| 2. You need to encrypt, not hash the authorization profile info in the
| cookie, otherwise your authorization manager will not be able to get
it
| back. <FRIDAY>Have fun managing the keys!</FRIDAY>
| 3. I would consider keeping the authorization info in a security store
| and encoding only the id in the security token. But then again, this
is
| really what container-managed security does :-)
| 4. I would recommend keeping the authorization timeouts short --
hitting
| the DB to refresh auth profiles.  This is more secure and also allows
| you to cut off access more quickly.  If your tokens are valid for an
| hour, then privilege revocation can take up to an hour to become
| effective.
| 
| 
| hth,
| 
| Phil
| 
| Jacob Hookom wrote:
| > I know I beat security like a dead horse, but....
| >
| > If my app generates a menu specific to the user, i.e., a project
list
| > that they belong to, then instead of creating a link to the
| > project.do?id=25, do you think it would be secure enough if I passed
a
| > huge "certificate" instead that had an hour time limit on it?  The
link
| > would instead be:
| >
| > project.do?id=AJEIKL46642K32343OIN4
| >
| > (Where the project uid is hashed with a timestamp and their role as
the
| > param)
| >
| > I know some developers use it when they are securing sites that span
| > multiple servers, but for this, it would prevent redundant db access
at
| > best.
| >
| > Does anyone else use this method?
| >
| > Jacob Hookom
| > Comprehensive Computer Science
| > University of Wisconsin, Eau Claire
| >
| >
| >
| > ---
| > Outgoing mail is certified Virus Free.
| > Checked by AVG anti-virus system (http://www.grisoft.com).
| > Version: 6.0.381 / Virus Database: 214 - Release Date: 8/2/2002
| >
| >
| >
| > --
| > To unsubscribe, e-mail:   <mailto:struts-user-
| [EMAIL PROTECTED]>
| > For additional commands, e-mail: <mailto:struts-user-
| [EMAIL PROTECTED]>
| >
| 
| 
| 
| 
| --
| To unsubscribe, e-mail:   <mailto:struts-user-
| [EMAIL PROTECTED]>
| For additional commands, e-mail: <mailto:struts-user-
| [EMAIL PROTECTED]>
| 
| ---
| Incoming mail is certified Virus Free.
| Checked by AVG anti-virus system (http://www.grisoft.com).
| Version: 6.0.381 / Virus Database: 214 - Release Date: 8/2/2002
| 

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.381 / Virus Database: 214 - Release Date: 8/2/2002
 


--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to