Spring Security
3.0.0.M2 Spring Security v
UsernamePasswordAuthenticationProcessingFilter ................... 48
Application Flow on Authentication Success and Failure ............................ 49
9. Basic and Digest Authentication .................................................................................... 51
9.1. BasicProcessingFilter ........................................................................... 51
Configuration ................................................................................................... 51
9.2. DigestProcessingFilter ......................................................................... 52
Configuration ................................................................................................... 53
10. Remember-Me Authentication ..................................................................................... 54
10.1. Overview ......................................................................................................... 54
10.2. Simple Hash-Based Token Approach ................................................................ 54
10.3. Persistent Token Approach ............................................................................... 55
10.4. Remember-Me Interfaces and Implementations .................................................. 55
TokenBasedRememberMeServices .................................................................... 56
PersistentTokenBasedRememberMeServices ...................................................... 56
11. Concurrent Session Handling ...................................................................................... 57
12. Anonymous Authentication ......................................................................................... 58
12.1. Overview ......................................................................................................... 58
12.2. Configuration ................................................................................................... 58
12.3. AuthenticationTrustResolver ............................................................ 59
IV. Authorization ..................................................................................................................... 61
13. Common Authorization Concepts ................................................................................ 62
13.1. Authorities ....................................................................................................... 62
13.2. Pre-Invocation Handling ................................................................................... 62
The AccessDecisionManager ............................................................................ 62
Voting-Based AccessDecisionManager Implementations ............................. 63
13.3. After Invocation Handling ................................................................................ 65
ACL-Aware AfterInvocationProviders ............................................................... 66
13.4. Authorization Tag Libraries .............................................................................. 67
14. Secure Object Implementations ................................................................................... 69
14.1. AOP Alliance (MethodInvocation) Security Interceptor ...................................... 69
Explicit MethodSecurityIterceptor Configuration ................................................ 69
14.2. AspectJ (JoinPoint) Security Interceptor ............................................................ 69
V. Advanced Topics ................................................................................................................. 72
15. Domain Object Security (ACLs) .................................................................................. 73
15.1. Overview ......................................................................................................... 73
15.2. Key Concepts .................................................................................................. 74
15.3. Getting Started ................................................................................................ 76
16. Pre-Authentication Scenarios ....................................................................................... 78
16.1. Pre-Authentication Framework Classes ............................................................. 78
AbstractPreAuthenticatedProcessingFilter .......................................................... 78
AbstractPreAuthenticatedAuthenticationDetailsSource ........................................ 79
J2eeBasedPreAuthenticatedWebAuthenticationDetailsSource ...................... 79
PreAuthenticatedAuthenticationProvider ............................................................ 79
Http403ForbiddenEntryPoint ............................................................................. 79
16.2. Concrete Implementations ................................................................................ 80
评论0
最新资源