Craig,
I agree with most of your points but you must admit that the non-standard 
implementations of CMA are a pain.  Not really when you work for a company 
that sells a container (Sun, BEA, IBM) because you'll always be using 
their's, but when developing for a number of containers this can be painful.

It would help if at least one standard implementation was prescribed by the 
spec...I personally like tomcat's jdbc realm implementation.

Dave


>From: "Craig R. McClanahan" <[EMAIL PROTECTED]>
>Reply-To: "Struts Users Mailing List" <[EMAIL PROTECTED]>
>To: Struts Users Mailing List <[EMAIL PROTECTED]>,      
><[EMAIL PROTECTED]>
>Subject: RE: Using CheckLogin tag from within tiles
>Date: Mon, 7 Oct 2002 23:48:38 -0700 (PDT)
>
>
>
>On Tue, 8 Oct 2002, Andrew Hill wrote:
>
> >
> > My (exceedingly limited) understanding of CMA was that it was very 
>container
> > specific. If so what approach do you recomend for an app (accessing 
>ejbs)
> > which customers are to run in their own container, where at development 
>time
> > one desnt know which container will be used?
> >
>
>To answer this question, you really need to think about what portion of
>the problem is container-specific and what is not.  In the case of CMA,
>the mechanism you use to set up users/groups/roles is container-specific,
>but the application that you deploy is ***not*** container-specific.  Do
>you see the difference?
>
>All you need to do is configure users with the correct roles in both your
>development environment and your production environment, and your app can
>be appropriately tested, and then deployed with no changes to the WAR or
>EAR itself.  That is because a WAR or EAR contains zero references to any
>actual users - it only talks about roles and restrictions based on those
>roles.  Authenticating users, and determining which roles they have, is
>the container's problem -- not the application's problem.
>
> > Is it better to ditch CMA and hope for the best from a home grown 
>solution,
> > or to try and find the resources to write seperate versions of the app 
>for
> > each of the major containers?
> >
>
>Any application developer who thinks that he or she understands enough
>about security (and all the possible things that can go wrong) to
>implement application managed security safely is welcome to do so.  But
>please warn me which publicly visible apps you've built, and I will make a
>note not to use them.
>
>I'm very serious about this.
>
>If you don't have a fundamentally correct security implementation as an
>overall top level goal (perfect security does not exist; it's all a matter
>of how much you're willing to spend versus the risk/cost of security
>breaches), you are wasting your time even bothering with it at all, unless
>this is a trivially simple intranet app with no damaging implications if
>your security scheme is bypassed by enterprising (or malicious) users.
>
> > (Or tell em they can have any container so long as its Tomcat? (This 
>would
> > be my choice if I was dictator for life ;->))
> >
>
>Having been a Tomcat developer, I can tell you that even container managed
>security cannot be trusted totally (despite how many hundreds of thousands
>of times Tomcat has been downloaded, a long standing security
>vulnerability was recently found (not with CMA in this case, but the
>principle still applies).
>
>But I will trust the container managed security implementation of any
>widely deployed container a *lot* more than I will trust the application
>managed security of any arbitrary application (including my own).  It is
>very much worth the pain of having to be container-specific about
>administering your user database to have some comfort in the fact that
>better heads than yours has been involved in setting up your container's
>authentication and authorization implementations.
>
>You know the number one security-related question on TOMCAT-USER?  "How
>can I authenicate my users using Windows security?"  Nobody even seems to
>think about the security implications of sending usernames and passwords
>across a network where people who are salivating to attack your server can
>see it ...
>
>Sheesh.
>
>Craig (who subscribes to various security lists and is
>        *astounded/scared to death* at how many vulnerabilities
>         continue to show up)
>
>
>--
>To unsubscribe, e-mail:   
><mailto:[EMAIL PROTECTED]>
>For additional commands, e-mail: 
><mailto:[EMAIL PROTECTED]>




_________________________________________________________________
Send and receive Hotmail on your mobile device: http://mobile.msn.com


--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to