Thanks.

Where can I get a copy of the Security proposal ?

- viraf

--- James Taylor <[EMAIL PROTECTED]> wrote:
> 
> > I would have assumed that the capabilities of a
> user
> > are associated with the principal rather than the
> > subject.  A prime example would be one in which a
> > Subject may play the role of an Admin and some
> other
> > non Admin role.  Typically a principal may not
> play
> > both roles, however a Subject may.
> 
> This is a perfectly valid interpretation. In this
> case you would write
> an implementation of authorization which looks at
> the prinicpal that was
> used to authenticate the subject, and determine
> whether the user has a
> given permission based on that. 
> 
> However this is not (IMO) a general enough
> interpretation to be used for
> the default implementation. I personally have never
> worked with an
> application where users get different capabilities
> depending on how they
> login, but can certainly see cases where that would
> be usefull. However
> there are all kinds of state modifiers which can
> affect whether a user
> has a given permission. I see these as falling into
> two sets. The first
> is the security datastore which contains whatever
> data model is used to
> map subjects to permissions. This is the static
> model of security for an
> application. The other is the Scope, which contains
> whatever application
> state may determine whether a user has a permission
> at a particular
> time. This can include all kinds of application
> dependent things like
> what principal was used to authenticate, what
> section of the application
> the user is working in, what 'project' a user is
> currently working with
> (think scarab). All of these are application
> specific things which the
> default security implementation needs to be abstract
> enough to deal
> with.
> 
> There will also be cases that fall completely
> outside of the
> Subject/Permission model of security that the
> default implementation
> will be based on. For these cases, you can implement
> your own security
> manager to do whatever whacked out thing you want.
> 
> Thus the goal is to provide complete flexibility at
> two levels. First,
> an empty SecurityManager interface which allows
> implementing a
> completely custom security model.
> 
> Second, a default implementation based on the
> Subject/Permission model
> with pluggable components for various tasks
> (authentication,
> authorization, ...), and likely some basic
> implementations of each
> component. 
> 
> Since most applications use such a model, ideally
> this will make it
> easier to implement application security, since you
> only need to replace
> the components that differ from one of the provided
> ones. However if
> your application doesn't fit into this model, it
> will be possible to fit
> your model into turbine without needing to hack up
> the core.
> 
> -- jt
> 
> 
> --
> To unsubscribe, e-mail:  
> <mailto:[EMAIL PROTECTED]>
> For additional commands, e-mail:
> <mailto:[EMAIL PROTECTED]>
> 


__________________________________________________
Do You Yahoo!?
Send FREE Valentine eCards with Yahoo! Greetings!
http://greetings.yahoo.com

--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to