While I was originally enthusiastic about the inclusion of LDAP
authentication as a natural extension of Turbine, I'm now wondering why
Turbine builds it's own authentication scheme rather than using the
underlying Servlet 2.3 Realm (JNDIRealm) model build into Tomcat?

It seems more natural to simply extend the Realm implementation to enable
the admittedly nice permission/role/group model provided by Turbine.  Then
people could use whatever authentication model they like (LDAP/RDBMS/Memory)
and still access the Turbine permissions.

This solves a rather significant problem needing to do single sign-on across
multiple webapps.  I'll assert, in the interest of fostering discussion,
that you can't do that with the Turbine model.  The Turbine model
authenticates within a servlet context (webapp), but not across them, as the
Tomcat implementation of the Servlet 2.3 Realm model supports.

Also, if you look at the Turbine LDAPUserManager.java and the Tomcat
JNDIRealm.java you'll notice immense logical similarity.  Why duplicate this
code? 

Chris, as for your SSL questions, since the interaction between Turbine and
the LDAP server takes place behind our firewall, I wasn't planning on using
SSL.  But I'm open to arguments to in favor of it :).

-Mitch

-----Original Message-----
From: Chris Holman [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 04, 2002 5:33 AM
To: Turbine Developers List
Subject: RE: LDAP Authentication


I would be interested in getting involved with this.

We are planning a set of turbine web app's that I would like to authenticate
via LDAP over SSL.
Mitchell: Do you intended to implement the LDAP SSL features?
If not, perhaps we can take an aside to design this into the class
hierarchy?

Chris

> -----Original Message-----
> From: Eric Dobbs [mailto:[EMAIL PROTECTED]]
> Sent: 02 February 2002 00:28
> To: Turbine Developers List
> Subject: Re: LDAP Authentication
>
>
> On Friday, February 1, 2002, at 04:52  PM, Mitchell Christensen wrote:
>
> > You are correct.  The most recent list of JNDI service providers
> > (http://java.sun.com/products/jndi/serviceproviders.html#12)
> > includes LDAP, COS Naming, RMI Registry, NIS, DSML, DNS, File System,
> > Novell
> > and the Windows Registry.  I think that a JNDISecurityService is the
> > way to
> > go, but you're right, I should probably focus on the LDAPSecurityService
> > given my schedule and make it LDAP specific.
>
> I love it when my intuition matches reality!  Thanks.
>
> LDAP by itself would probably make quite a few people happy.
> And tt is your itch to scratch after all.
>
>
> > I did send a message directly to Jason, and one other (I don't remember
> > which) 2+ days ago and recieved no response.  Hopefully they'll hit this
> > discussion and want to get involved.
>
> Jason is only just getting back from a trip to NYC.  He'll have
> some email to catch up on, I'm sure.
>
>
> > I think that in the meantime I'll subclass LDAPUserManager and
> > LDAPSecurityService and get things working like that.  Once that works,
> > I'll
> > share those files and we can discuss how to best implement the changes
> > within Turbine.
> >
> > Sound reasonable?
>
> yep.
>
>
> > PS I'm all for a better "long-term" solution, and would be interested in
> > participating, time permitting.
>
> +1
>
>
> -Eric
>
> --
> To unsubscribe, e-mail:
<mailto:[EMAIL PROTECTED]>
For additional commands, e-mail:
<mailto:[EMAIL PROTECTED]>


--
To unsubscribe, e-mail:
<mailto:[EMAIL PROTECTED]>
For additional commands, e-mail:
<mailto:[EMAIL PROTECTED]>

--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to