directory-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From elecha...@apache.org
Subject [1/2] directory-fortress-core git commit: Fixed various Javadoc issues
Date Wed, 06 Jan 2016 22:48:49 GMT
Repository: directory-fortress-core
Updated Branches:
  refs/heads/master 8d4f652d2 -> 14c715145


http://git-wip-us.apache.org/repos/asf/directory-fortress-core/blob/14c71514/src/main/java/org/apache/directory/fortress/core/impl/AuditMgrImpl.java
----------------------------------------------------------------------
diff --git a/src/main/java/org/apache/directory/fortress/core/impl/AuditMgrImpl.java b/src/main/java/org/apache/directory/fortress/core/impl/AuditMgrImpl.java
index 569c288..8b4a25b 100755
--- a/src/main/java/org/apache/directory/fortress/core/impl/AuditMgrImpl.java
+++ b/src/main/java/org/apache/directory/fortress/core/impl/AuditMgrImpl.java
@@ -34,47 +34,73 @@ import org.apache.directory.fortress.core.model.UserAudit;
 import java.util.List;
 
 /**
- * This object performs searches across <a href="http://www.openldap.org/">OpenLDAP</a>'s
slapd access log.  The access log events are
- * persisted in <a href="http://www.oracle.com/technetwork/database/berkeleydb/overview/index.html">BDB</a>
and available for inquiry via common LDAP protocols.
- * Audit entries stored on behalf of Fortress operations correspond to runtime authentication
{@link org.apache.directory.fortress.core.model.Bind}, authorization {@link org.apache.directory.fortress.core.model.AuthZ}
and modification {@link org.apache.directory.fortress.core.model.Mod}
- * events as they occur automatically on the server when audit is enabled.
+ * This object performs searches across <a href="http://www.openldap.org/">OpenLDAP</a>'s
slapd access log.  The access log 
+ * events are persisted in <a href="http://www.oracle.com/technetwork/database/berkeleydb/overview/index.html">BDB</a>
and 
+ * available for inquiry via common LDAP protocols.
+ * Audit entries stored on behalf of Fortress operations correspond to runtime authentication

+ * {@link org.apache.directory.fortress.core.model.Bind}, authorization 
+ * {@link org.apache.directory.fortress.core.model.AuthZ} and modification 
+ * {@link org.apache.directory.fortress.core.model.Mod} events as they occur automatically
on the server when audit is 
+ * enabled.
+ * <h3></h3>
  * <h4>Audit Interrogator</h4>
  * Provides an OpenLDAP access log retrieval mechanism that enables security event monitoring.
  * <ol>
- * <li>Authentication events:
- * <li>Session enablement events
- * <li>Authorization events
- * <li>Entity mods and deletes
- * </li>
+ *   <li>Authentication events:</li>
+ *   <li>Session enablement events</li>
+ *   <li>Authorization events</li>
+ *   <li>Entity mods and deletes</li>
  * </ol>
- * <img src="../doc-files/Audit.png">
- * <p/>
+ * <img src="../doc-files/Audit.png" alt="">
+ * <p>
  * All events include Fortress context, see {@link org.apache.directory.fortress.core.model.FortEntity}.
- * <p/>
  * <h4>
  * The following APIs generate events subsequently stored in this access log:
  * </h4>
  * <ul>
- * <li> {@link org.apache.directory.fortress.core.AccessMgr}
- * <li> {@link org.apache.directory.fortress.core.AdminMgr}
- * <li> {@link org.apache.directory.fortress.core.AdminMgr}
- * <li> {@link org.apache.directory.fortress.core.DelAdminMgr}
- * <li> {@link org.apache.directory.fortress.core.ConfigMgr}
- * <li> {@link org.apache.directory.fortress.core.PwPolicyMgr}
+ *   <li>{@link org.apache.directory.fortress.core.AccessMgr}</li>
+ *   <li>{@link org.apache.directory.fortress.core.AdminMgr}</li>
+ *   <li>{@link org.apache.directory.fortress.core.AdminMgr}</li>
+ *   <li>{@link org.apache.directory.fortress.core.DelAdminMgr}</li>
+ *   <li>{@link org.apache.directory.fortress.core.ConfigMgr}</li>
+ *   <li>{@link org.apache.directory.fortress.core.PwPolicyMgr}</li>
  * </ul>
  * <h4>
  * The following reports are supported using search input: {@link org.apache.directory.fortress.core.model.UserAudit}
  * </h4>
  * <ul>
- * <li>User Authentications:     <code>List<{@link org.apache.directory.fortress.core.model.Bind}>
 {@link org.apache.directory.fortress.core.AuditMgr#searchBinds(org.apache.directory.fortress.core.model.UserAudit)}</code>
- * <li>Invalid Users AuthN:      <code>List<{@link org.apache.directory.fortress.core.model.Bind}>
 {@link org.apache.directory.fortress.core.AuditMgr#searchInvalidUsers(org.apache.directory.fortress.core.model.UserAudit)}
</code>
- * <li>User Authorizations 1:    <code>List<{@link org.apache.directory.fortress.core.model.AuthZ}>
{@link org.apache.directory.fortress.core.AuditMgr#getUserAuthZs(org.apache.directory.fortress.core.model.UserAudit)}
</code>
- * <li>User Authorizations 2:    <code>List<{@link org.apache.directory.fortress.core.model.AuthZ}>
{@link org.apache.directory.fortress.core.AuditMgr#searchAuthZs(org.apache.directory.fortress.core.model.UserAudit)}
</code>
- * <li>User Session Activations: <code>List<{@link org.apache.directory.fortress.core.model.Mod}>
  {@link org.apache.directory.fortress.core.AuditMgr#searchUserSessions(org.apache.directory.fortress.core.model.UserAudit)}
</code>
- * <li>Entity Modifications:     <code>List<{@link org.apache.directory.fortress.core.model.Mod}>
  {@link org.apache.directory.fortress.core.AuditMgr#searchAdminMods(org.apache.directory.fortress.core.model.UserAudit)}
</code>
- *
+ *   <li>
+ *     User Authentications: <code>List&lt;{@link org.apache.directory.fortress.core.model.Bind}&gt;
 
+ *     {@link org.apache.directory.fortress.core.AuditMgr#searchBinds(org.apache.directory.fortress.core.model.UserAudit)}
+ *     </code>
+ *   </li>
+ *   <li>
+ *     Invalid Users AuthN: <code>List&lt;{@link org.apache.directory.fortress.core.model.Bind}&gt;
 
+ *     {@link org.apache.directory.fortress.core.AuditMgr#searchInvalidUsers(org.apache.directory.fortress.core.model.UserAudit)}

+ *     </code>
+ *   </li>
+ *   <li>
+ *     User Authorizations 1: <code>List&lt;{@link org.apache.directory.fortress.core.model.AuthZ}&gt;

+ *     {@link org.apache.directory.fortress.core.AuditMgr#getUserAuthZs(org.apache.directory.fortress.core.model.UserAudit)}

+ *     </code>
+ *   </li>
+ *   <li>
+ *     User Authorizations 2: <code>List&lt;{@link org.apache.directory.fortress.core.model.AuthZ}&gt;
+ *     {@link org.apache.directory.fortress.core.AuditMgr#searchAuthZs(org.apache.directory.fortress.core.model.UserAudit)}

+ *     </code>
+ *   </li>
+ *   <li>
+ *     User Session Activations: <code>List&lt;{@link org.apache.directory.fortress.core.model.Mod}&gt;
 
+ *     {@link org.apache.directory.fortress.core.AuditMgr#searchUserSessions(org.apache.directory.fortress.core.model.UserAudit)}

+ *     </code>
+ *   </li>
+ *   <li>
+ *     Entity Modifications: <code>List&lt;{@link org.apache.directory.fortress.core.model.Mod}&gt;
  
+ *     {@link org.apache.directory.fortress.core.AuditMgr#searchAdminMods(org.apache.directory.fortress.core.model.UserAudit)}
+ *     </code>
+ *   </li>
  * </ul>
- * <p/>
+ * <p>
  * This class is NOT thread safe if parent instance variables ({@link #contextId} or {@link
#adminSess}) are set.
  *
  * @author <a href="mailto:dev@directory.apache.org">Apache Directory Project</a>

http://git-wip-us.apache.org/repos/asf/directory-fortress-core/blob/14c71514/src/main/java/org/apache/directory/fortress/core/impl/ConfigMgrImpl.java
----------------------------------------------------------------------
diff --git a/src/main/java/org/apache/directory/fortress/core/impl/ConfigMgrImpl.java b/src/main/java/org/apache/directory/fortress/core/impl/ConfigMgrImpl.java
index 6895477..5fb06f9 100755
--- a/src/main/java/org/apache/directory/fortress/core/impl/ConfigMgrImpl.java
+++ b/src/main/java/org/apache/directory/fortress/core/impl/ConfigMgrImpl.java
@@ -29,12 +29,12 @@ import java.util.Properties;
  * This Manager impl supplies CRUD methods used to manage properties stored within the ldap
directory.
  * The Fortress config nodes are used to remotely share Fortress client specific properties
between processes.
  * Fortress places no limits on the number of unique configurations that can be present at
one time in the directory.
- * The Fortress client will specify the preferred cfg node by name via a property named,
{@link org.apache.directory.fortress.core.GlobalIds#CONFIG_REALM}.
+ * The Fortress client will specify the preferred cfg node by name via a property named,

+ * {@link org.apache.directory.fortress.core.GlobalIds#CONFIG_REALM}.
  * Each process using Fortress client is free to share an existing node with other processes
or create its own unique config
  * instance using the methods within this class.<BR>
- * <p/>
+ * <p>
  * This class is thread safe.
- * <p/>
  *
  * @author <a href="mailto:dev@directory.apache.org">Apache Directory Project</a>
  */

http://git-wip-us.apache.org/repos/asf/directory-fortress-core/blob/14c71514/src/main/java/org/apache/directory/fortress/core/impl/DelAccessMgrImpl.java
----------------------------------------------------------------------
diff --git a/src/main/java/org/apache/directory/fortress/core/impl/DelAccessMgrImpl.java b/src/main/java/org/apache/directory/fortress/core/impl/DelAccessMgrImpl.java
index ed740c6..31d1b66 100755
--- a/src/main/java/org/apache/directory/fortress/core/impl/DelAccessMgrImpl.java
+++ b/src/main/java/org/apache/directory/fortress/core/impl/DelAccessMgrImpl.java
@@ -37,24 +37,28 @@ import java.util.Set;
 import java.util.TreeSet;
 
 /**
- * This class implements the ARBAC02 DelAccessMgr interface for performing runtime delegated
access control operations on objects that are provisioned Fortress ARBAC entities
- * that reside in LDAP directory.  These APIs map directly to similar named APIs specified
by ARBAC02 functions.  The ARBAC Functional specification describes delegated administrative
- * operations for the creation and maintenance of ARBAC element sets and relations.  Delegated
administrative review functions for performing administrative queries
- * and system functions for creating and managing ARBAC attributes on user sessions and making
delegated administrative access control decisions.
+ * This class implements the ARBAC02 DelAccessMgr interface for performing runtime delegated
access control operations on 
+ * objects that are provisioned Fortress ARBAC entities that reside in LDAP directory.  These
APIs map directly to similar 
+ * named APIs specified by ARBAC02 functions.  The ARBAC Functional specification describes
delegated administrative 
+ * operations for the creation and maintenance of ARBAC element sets and relations.  Delegated
administrative review 
+ * functions for performing administrative queries and system functions for creating and
managing ARBAC attributes on user 
+ * sessions and making delegated administrative access control decisions.
  *
  * This class also extends the RBAC AccessMgrImpl object which is used for performing runtime
session creation and
- * access control decisions based on behalf of administrative user who is logged onto the
system.  (See the AccessMgr javadoc for more info of how RBAC works).
+ * access control decisions based on behalf of administrative user who is logged onto the
system.  
+ * (See the AccessMgr javadoc for more info of how RBAC works).
  *
- * This class provides both sets of functionality as is necessary to fulfill runtime delegated
administrative access control functionality
- * within RBAC provisioning systems.
+ * This class provides both sets of functionality as is necessary to fulfill runtime delegated
administrative access control 
+ * functionality within RBAC provisioning systems.
  * <h3>Administrative Role Based Access Control (ARBAC)</h3>
- * <img src="../doc-files/ARbac.png">
- * <p/>
- * Fortress fully supports the Oh/Sandhu/Zhang ARBAC02 model for delegated administration.
 ARBAC provides large enterprises the capability to delegate administrative authority to users
that reside outside of the security admin group.
- * Decentralizing administration helps because it provides security provisioning capability
to work groups without sacrificing regulations for accountability or traceability.
- * <p/>
+ * <img src="../doc-files/ARbac.png" alt="">
+ * <p>
+ * Fortress fully supports the Oh/Sandhu/Zhang ARBAC02 model for delegated administration.
 ARBAC provides large enterprises 
+ * the capability to delegate administrative authority to users that reside outside of the
security admin group.
+ * Decentralizing administration helps because it provides security provisioning capability
to work groups without 
+ * sacrificing regulations for accountability or traceability.
+ * <p>
  * This class is NOT thread safe if parent instance variables ({@link #contextId} or {@link
#adminSess}) are set.
- * <p/>
  *
  * @author <a href="mailto:dev@directory.apache.org">Apache Directory Project</a>
  */

http://git-wip-us.apache.org/repos/asf/directory-fortress-core/blob/14c71514/src/main/java/org/apache/directory/fortress/core/impl/DelAdminMgrImpl.java
----------------------------------------------------------------------
diff --git a/src/main/java/org/apache/directory/fortress/core/impl/DelAdminMgrImpl.java b/src/main/java/org/apache/directory/fortress/core/impl/DelAdminMgrImpl.java
index 4d82060..cf79a09 100755
--- a/src/main/java/org/apache/directory/fortress/core/impl/DelAdminMgrImpl.java
+++ b/src/main/java/org/apache/directory/fortress/core/impl/DelAdminMgrImpl.java
@@ -42,16 +42,19 @@ import java.util.Set;
 /**
  * This class implements the ARBAC02 DelAdminMgr interface for performing policy administration
of Fortress ARBAC entities
  * that reside in LDAP directory.
- * These APIs map directly to similar named APIs specified by ARBAC02 functions.  The ARBAC
Functional specification describes delegated administrative
- * operations for the creation and maintenance of ARBAC element sets and relations.  Delegated
administrative review functions for performing administrative queries
- * and system functions for creating and managing ARBAC attributes on user sessions and making
delegated administrative access control decisions.
+ * These APIs map directly to similar named APIs specified by ARBAC02 functions.  The ARBAC
Functional specification 
+ * describes delegated administrative operations for the creation and maintenance of ARBAC
element sets and relations.  
+ * Delegated administrative review functions for performing administrative queries and system
functions for creating and 
+ * managing ARBAC attributes on user sessions and making delegated administrative access
control decisions.
  * This class is NOT thread safe.
  * <h3>Administrative Role Based Access Control (ARBAC)</h3>
- * <img src="../doc-files/ARbac.png">
- * <p/>
- * Fortress fully supports the Oh/Sandhu/Zhang ARBAC02 model for delegated administration.
 ARBAC provides large enterprises the capability to delegate administrative authority to users
that reside outside of the security admin group.
- * Decentralizing administration helps because it provides security provisioning capability
to work groups without sacrificing regulations for accountability or traceability.
- * <p/>
+ * <img src="../doc-files/ARbac.png" alt="">
+ * <p>
+ * Fortress fully supports the Oh/Sandhu/Zhang ARBAC02 model for delegated administration.
 ARBAC provides large enterprises 
+ * the capability to delegate administrative authority to users that reside outside of the
security admin group.
+ * Decentralizing administration helps because it provides security provisioning capability
to work groups without 
+ * sacrificing regulations for accountability or traceability.
+ * <p>
  * This class is NOT thread safe if parent instance variables ({@link #contextId} or {@link
#adminSess}) are set.
  *
  * @author <a href="mailto:dev@directory.apache.org">Apache Directory Project</a>

http://git-wip-us.apache.org/repos/asf/directory-fortress-core/blob/14c71514/src/main/java/org/apache/directory/fortress/core/impl/DelReviewMgrImpl.java
----------------------------------------------------------------------
diff --git a/src/main/java/org/apache/directory/fortress/core/impl/DelReviewMgrImpl.java b/src/main/java/org/apache/directory/fortress/core/impl/DelReviewMgrImpl.java
index 292a13a..58ee215 100755
--- a/src/main/java/org/apache/directory/fortress/core/impl/DelReviewMgrImpl.java
+++ b/src/main/java/org/apache/directory/fortress/core/impl/DelReviewMgrImpl.java
@@ -31,21 +31,24 @@ import org.apache.directory.fortress.core.util.VUtil;
 import java.util.List;
 
 /**
- * This class implements the ARBAC02 DelReviewMgr interface for performing policy interrogation
of provisioned Fortress ARBAC entities
- * that reside in LDAP directory.
- * These APIs map directly to similar named APIs specified by ARBAC02 functions.  The ARBAC
Functional specification describes delegated administrative
- * operations for the creation and maintenance of ARBAC element sets and relations.  Delegated
administrative review functions for performing administrative queries
- * and system functions for creating and managing ARBAC attributes on user sessions and making
delegated administrative access control decisions.
+ * This class implements the ARBAC02 DelReviewMgr interface for performing policy interrogation
of provisioned Fortress 
+ * ARBAC entities that reside in LDAP directory.
+ * These APIs map directly to similar named APIs specified by ARBAC02 functions.  The ARBAC
Functional specification 
+ * describes delegated administrative
+ * operations for the creation and maintenance of ARBAC element sets and relations.  Delegated
administrative review 
+ * functions for performing administrative queries and system functions for creating and
managing ARBAC attributes on user
+ * sessions and making delegated administrative access control decisions.
  * <h3>Administrative Role Based Access Control (ARBAC)</h3>
- * <img src="../doc-files/ARbac.png">
- * <p/>
- * Fortress fully supports the Oh/Sandhu/Zhang ARBAC02 model for delegated administration.
 ARBAC provides large enterprises the capability to delegate administrative authority to users
that reside outside of the security admin group.
- * Decentralizing administration helps because it provides security provisioning capability
to work groups without sacrificing regulations for accountability or traceability.
- * <p/>
+ * <img src="../doc-files/ARbac.png" alt="">
+ * <p>
+ * Fortress fully supports the Oh/Sandhu/Zhang ARBAC02 model for delegated administration.
 ARBAC provides large enterprises 
+ * the capability to delegate administrative authority to users that reside outside of the
security admin group.
+ * Decentralizing administration helps because it provides security provisioning capability
to work groups without 
+ * sacrificing regulations for accountability or traceability.
+ * <p>
+ * This class is NOT thread safe if parent instance variables ({@link #contextId} or {@link
#adminSess}) are set.
  *
  * @author <a href="mailto:dev@directory.apache.org">Apache Directory Project</a>
- * <p/>
- * This class is NOT thread safe if parent instance variables ({@link #contextId} or {@link
#adminSess}) are set.
  */
 public class DelReviewMgrImpl extends Manageable implements DelReviewMgr
 {

http://git-wip-us.apache.org/repos/asf/directory-fortress-core/blob/14c71514/src/main/java/org/apache/directory/fortress/core/impl/GroupMgrImpl.java
----------------------------------------------------------------------
diff --git a/src/main/java/org/apache/directory/fortress/core/impl/GroupMgrImpl.java b/src/main/java/org/apache/directory/fortress/core/impl/GroupMgrImpl.java
index 78a2c62..3a09944 100755
--- a/src/main/java/org/apache/directory/fortress/core/impl/GroupMgrImpl.java
+++ b/src/main/java/org/apache/directory/fortress/core/impl/GroupMgrImpl.java
@@ -35,10 +35,8 @@ import java.util.List;
 /**
  * This Manager impl supplies CRUD methods used to manage groups stored within the ldap directory.
  * LDAP group nodes are used for utility and security functions within various systems and
apps.
- * <p/>
+ * <p>
  * This class is thread safe.
- * <p/>
-
  *
  * @author <a href="mailto:dev@directory.apache.org">Apache Directory Project</a>
  */

http://git-wip-us.apache.org/repos/asf/directory-fortress-core/blob/14c71514/src/main/java/org/apache/directory/fortress/core/impl/Manageable.java
----------------------------------------------------------------------
diff --git a/src/main/java/org/apache/directory/fortress/core/impl/Manageable.java b/src/main/java/org/apache/directory/fortress/core/impl/Manageable.java
index 73b3072..e5a71d2 100755
--- a/src/main/java/org/apache/directory/fortress/core/impl/Manageable.java
+++ b/src/main/java/org/apache/directory/fortress/core/impl/Manageable.java
@@ -28,11 +28,12 @@ import org.apache.directory.fortress.core.util.VUtil;
 
 /**
  * Abstract class allows outside clients to manage security and multi-tenant concerns within
the Fortress runtime.
- * The {@link #setAdmin(org.apache.directory.fortress.core.model.Session)} method allows
A/RBAC sessions to be loaded and allows authorization
+ * The {@link #setAdmin(org.apache.directory.fortress.core.model.Session)} method allows
A/RBAC sessions to be loaded and 
+ * allows authorization
  * to be performed on behalf of the user who is contained within the Session object itself.
  * The ARBAC permissions will be checked each time outside client makes calls into Fortress
API.
  * This interface also allows Fortress clients to operate in a multi-tenant fashion using
{@link #setContextId(String)}.
- * <p/>
+ * <p>
  * Implementers of this abstract class will NOT be thread safe because of instance variables
that may be set.
  *
  * @author <a href="mailto:dev@directory.apache.org">Apache Directory Project</a>
@@ -45,8 +46,8 @@ public abstract class Manageable implements org.apache.directory.fortress.core.M
 
     /**
      * Use this method to load an administrative user's ARBAC Session object into Manager
object will enable authorization to
-     * be performed on behalf of admin user.  Setting Session into this object will enforce
ARBAC controls and render this class'
-     * implementer thread unsafe.
+     * be performed on behalf of admin user.  Setting Session into this object will enforce
ARBAC controls and render this 
+     * class's implementer thread unsafe.
      *
      * @param session contains a valid Fortress A/RBAC Session object.
      */
@@ -90,7 +91,8 @@ public abstract class Manageable implements org.apache.directory.fortress.core.M
     
     
     /**
-     * Every Fortress Manager API (e.g. addUser, updateUser, addRole, ...) will perform authorization
on behalf of the caller IFF the {@link AuditMgrImpl#adminSess} has been set before invocation.
+     * Every Fortress Manager API (e.g. addUser, updateUser, addRole, ...) will perform authorization
on behalf of the 
+     * caller IFF the {@link AuditMgrImpl#adminSess} has been set before invocation.
      *
      * @param className contains the class name.
      * @param opName contains operation name.
@@ -112,13 +114,20 @@ public abstract class Manageable implements org.apache.directory.fortress.core.M
      * <p>
      * The information is used to
      * <ol>
-     * <li>Load the administrative User's {@link Session} object into entity.  This
is used for checking to ensure administrator has privilege to perform administrative operation.</li>
-     * <li>Load the target operation's permission into the audit context.  This is
used for Fortress audit log stored in OpenLDAP</li>
+     *   <li>
+     *     Load the administrative User's {@link Session} object into entity.  This is used
for checking to ensure 
+     *     administrator has privilege to perform administrative operation.
+     *   </li>
+     *   <li>
+     *     Load the target operation's permission into the audit context.  This is used for
Fortress audit log stored in 
+     *     OpenLDAP
+     *   </li>
      * </ol>
      *
      * @param className contains the class name.
      * @param opName contains operation name.
-     * @param entity  used to pass contextual information through Fortress layers for administrative
security checks and audit.
+     * @param entity  used to pass contextual information through Fortress layers for administrative
security checks and 
+     * audit.
      * @throws org.apache.directory.fortress.core.SecurityException
      *          in the event of data validation or system error.
      */
@@ -135,7 +144,8 @@ public abstract class Manageable implements org.apache.directory.fortress.core.M
 
     
     /**
-     * Method will throw exception if entity reference is null, otherwise will set the contextId
of the tenant onto the supplied entity reference.
+     * Method will throw exception if entity reference is null, otherwise will set the contextId
of the tenant onto the 
+     * supplied entity reference.
      * @param className contains the class name of caller.
      * @param opName contains operation name of caller.
      * @param entity  used here to pass the tenant id into the Fortress DAO layer..
@@ -150,7 +160,8 @@ public abstract class Manageable implements org.apache.directory.fortress.core.M
 
     
     /**
-     * Method will throw exception if entity reference is null, otherwise will set the contextId
of the tenant onto the supplied entity reference.
+     * Method will throw exception if entity reference is null, otherwise will set the contextId
of the tenant onto the 
+     * supplied entity reference.
      * 
      * @param methodName contains the full method name of caller.
      * @param entity  used here to pass the tenant id into the Fortress DAO layer..

http://git-wip-us.apache.org/repos/asf/directory-fortress-core/blob/14c71514/src/main/java/org/apache/directory/fortress/core/impl/PwPolicyMgrImpl.java
----------------------------------------------------------------------
diff --git a/src/main/java/org/apache/directory/fortress/core/impl/PwPolicyMgrImpl.java b/src/main/java/org/apache/directory/fortress/core/impl/PwPolicyMgrImpl.java
index a32867c..74cb0fa 100755
--- a/src/main/java/org/apache/directory/fortress/core/impl/PwPolicyMgrImpl.java
+++ b/src/main/java/org/apache/directory/fortress/core/impl/PwPolicyMgrImpl.java
@@ -30,29 +30,34 @@ import java.util.List;
 
 /**
  * This class is used to perform administrative and review functions on the PWPOLICIES and
USERS data sets.
- * <p/>
+ * <h3></h3>
  * <h4>Password Policies</h4>
- * <a href="http://www.openldap.org/">OpenLDAP</a> supports the IETF draft <a
href="http://tools.ietf.org/html/draft-behera-ldap-password-policy-10/">Password Policies
for LDAP directories</a></li>.  Policies may be applied at the user, group or
global level.
- * <p/>
- * <img src="../doc-files/PasswordPolicy.png">
- * <p/>
+ * <a href="http://www.openldap.org/">OpenLDAP</a> supports the IETF draft 
+ * <a href="http://tools.ietf.org/html/draft-behera-ldap-password-policy-10/">Password
Policies for LDAP directories</a></li>.  Policies may be applied at the user,
group or global level.
+ * <p>
+ * <img src="../doc-files/PasswordPolicy.png" alt="">
+ * <p>
  * Password enforcement options include:
  * <ol>
- * <li>A configurable limit on failed authentication attempts.</li>
- * <li>A counter to track the number of failed authentication attempts.</li>
- * <li>A time frame in which the limit of consecutive failed authentication attempts
must happen before action is taken.</li>
- * <li>The action to be taken when the limit is reached. The action will either be
nothing, or the account will be locked.</li>
- * <li>An amount of time the account is locked (if it is to be locked) This can be
indefinite.</li>
- * <li>Password expiration.</li>
- * <li>Expiration warning</li>
- * <li>Grace authentications</li>
- * <li>Password history</li>
- * <li>Password minimum age</li>
- * <li>Password minimum length</li>
- * <li>Password Change after Reset</li>
- * <li>Safe Modification of Password</li>
+ *   <li>A configurable limit on failed authentication attempts.</li>
+ *   <li>A counter to track the number of failed authentication attempts.</li>
+ *   <li>
+ *     A time frame in which the limit of consecutive failed authentication attempts must
happen before action is taken.
+ *   </li>
+ *   <li>
+ *     The action to be taken when the limit is reached. The action will either be nothing,
or the account will be locked.
+ *   </li>
+ *   <li>An amount of time the account is locked (if it is to be locked) This can be
indefinite.</li>
+ *   <li>Password expiration.</li>
+ *   <li>Expiration warning</li>
+ *   <li>Grace authentications</li>
+ *   <li>Password history</li>
+ *   <li>Password minimum age</li>
+ *   <li>Password minimum length</li>
+ *   <li>Password Change after Reset</li>
+ *   <li>Safe Modification of Password</li>
  * </ol>
- * <p/>
+ * <p>
  * This class is NOT thread safe if parent instance variables ({@link #contextId} or {@link
#adminSess}) are set.
  *
  * @author <a href="mailto:dev@directory.apache.org">Apache Directory Project</a>

http://git-wip-us.apache.org/repos/asf/directory-fortress-core/blob/14c71514/src/main/java/org/apache/directory/fortress/core/impl/ReviewMgrImpl.java
----------------------------------------------------------------------
diff --git a/src/main/java/org/apache/directory/fortress/core/impl/ReviewMgrImpl.java b/src/main/java/org/apache/directory/fortress/core/impl/ReviewMgrImpl.java
index 2c91535..48014bc 100755
--- a/src/main/java/org/apache/directory/fortress/core/impl/ReviewMgrImpl.java
+++ b/src/main/java/org/apache/directory/fortress/core/impl/ReviewMgrImpl.java
@@ -45,29 +45,34 @@ import java.util.Set;
  * and maintenance of RBAC element sets and relations; administrative review functions for
  * performing administrative queries; and system functions for creating and managing
  * RBAC attributes on user sessions and making access control decisions.
- * <p/>
+ * <p>
  * <hr>
+ * <h3></h3>
  * <h4>RBAC0 - Core</h4>
- * Many-to-many relationship between Users, Roles and Permissions. Selective role activation
into sessions.  API to add, update, delete identity data and perform identity and access control
decisions during runtime operations.
- * <p/>
- * <img src="../doc-files/RbacCore.png">
+ * Many-to-many relationship between Users, Roles and Permissions. Selective role activation
into sessions.  API to add, 
+ * update, delete identity data and perform identity and access control decisions during
runtime operations.
+ * <p>
+ * <img src="../doc-files/RbacCore.png" alt="">
  * <hr>
  * <h4>RBAC1 - General Hierarchical Roles</h4>
  * Simplifies role engineering tasks using inheritance of one or more parent roles.
- * <p/>
- * <img src="../doc-files/RbacHier.png">
+ * <p>
+ * <img src="../doc-files/RbacHier.png" alt="">
  * <hr>
  * <h4>RBAC2 - Static Separation of Duty (SSD) Relations</h4>
- * Enforce mutual membership exclusions across role assignments.  Facilitate dual control
policies by restricting which roles may be assigned to users in combination.  SSD provide
added granularity for authorization limits which help enterprises meet strict compliance regulations.
- * <p/>
- * <img src="../doc-files/RbacSSD.png">
+ * Enforce mutual membership exclusions across role assignments.  Facilitate dual control
policies by restricting which 
+ * roles may be assigned to users in combination.  SSD provide added granularity for authorization
limits which help 
+ * enterprises meet strict compliance regulations.
+ * <p>
+ * <img src="../doc-files/RbacSSD.png" alt="">
  * <hr>
  * <h4>RBAC3 - Dynamic Separation of Duty (DSD) Relations</h4>
- * Control allowed role combinations to be activated within an RBAC session.  DSD policies
fine tune role policies that facilitate authorization dual control and two man policy restrictions
during runtime security checks.
- * <p/>
- * <img src="../doc-files/RbacDSD.png">
+ * Control allowed role combinations to be activated within an RBAC session.  DSD policies
fine tune role policies that 
+ * facilitate authorization dual control and two man policy restrictions during runtime security
checks.
+ * <p>
+ * <img src="../doc-files/RbacDSD.png" alt="">
  * <hr>
- * <p/>
+ * <p>
  * This class is NOT thread safe if parent instance variables ({@link #contextId} or {@link
#adminSess}) are set.
  *
  * @author <a href="mailto:dev@directory.apache.org">Apache Directory Project</a>


Mime
View raw message