geronimo-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Aaron Mulder (JIRA)" <...@geronimo.apache.org>
Subject [jira] Commented: (GERONIMO-454) Support Group Name = Role Name Role Mapping
Date Tue, 23 Nov 2004 03:05:23 GMT
     [ http://nagoya.apache.org/jira/browse/GERONIMO-454?page=comments#action_55779 ]
     
Aaron Mulder commented on GERONIMO-454:
---------------------------------------

The latest thought is that it should look more like this:

<automatic-role-mapping login-domain="foo">*
  <principal-class>foo.GroupPrincipal</principal-class>*
</automatic-role-mapping>

Since the server needs a login domain in order to construct the RealmPrincipals to use for
role mapping.  The principal-class is still optional because the realm can be configured to
know what principal classes to automap for each login domain by default (for example, if a
LoginModule implements DeploymentSupport, or the analogous property is manually set on the
realm).

> Support Group Name = Role Name Role Mapping
> -------------------------------------------
>
>          Key: GERONIMO-454
>          URL: http://nagoya.apache.org/jira/browse/GERONIMO-454
>      Project: Apache Geronimo
>         Type: Improvement
>   Components: deployment, security
>     Versions: 1.0-M2
>     Reporter: Aaron Mulder
>     Assignee: Alan Cabrera

>
> Currently, you must manually map principals to roles in the security component of a deployment
descriptor.  In the common case where group names match role names, this seems like unnecessary
overhead.
> Alan and I talked and our plan is to make the role-mapping parts of the security elements
look something like this:
> <security>
>   ...
>   <automatic-role-mapping>?
>     <principal-class>foo.GroupPrincipal</principal-class>*
>   </automatic-role-mapping>
>   <role-mapping>?
>     ...
>   </role-mapping>
> </security>
> The automatic-role-mapping is the new bit.  If you specify that element empty, it would
map every principal type the security realm considers to be a group to roles.  For example,
if you configure the seucrity realm to consider the principal class "foo.GroupPrincipal" as
a role, and use an empty automatic-role-mapping element, that's what you'd get.  You can also
manually specify one or more principal classes that should be automatically mapped to roles.
 In any of these cases, the "automatic" mapping is done based on the role name and group name
matching.
> If you specify automatic mapping *and* individual role mapping, then the user just needs
to qualify for the role based on either one or the other (not both).  So you could use a manual
role mapping to add eligible users on top of the automatic role mapping, but not to subtract
users from the automatic role mapping.

-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
   http://nagoya.apache.org/jira/secure/Administrators.jspa
-
If you want more information on JIRA, or have a bug to report see:
   http://www.atlassian.com/software/jira


Mime
View raw message