Return-Path: Delivered-To: apmail-jakarta-tomcat-user-archive@jakarta.apache.org Received: (qmail 10445 invoked by uid 500); 3 Jul 2001 09:50:26 -0000 Mailing-List: contact tomcat-user-help@jakarta.apache.org; run by ezmlm Precedence: bulk Reply-To: tomcat-user@jakarta.apache.org list-help: list-unsubscribe: list-post: Delivered-To: mailing list tomcat-user@jakarta.apache.org Received: (qmail 10429 invoked from network); 3 Jul 2001 09:50:23 -0000 Received: from 202-0-34-141.cable.paradise.net.nz (HELO claudia.dyn.dhs.org) (202.0.34.141) by h31.sny.collab.net with SMTP; 3 Jul 2001 09:50:23 -0000 Received: from claudia.dyn.dhs.org (samantha [192.168.1.104]) by claudia.dyn.dhs.org (Postfix) with ESMTP id 60909E840 for ; Tue, 3 Jul 2001 22:44:31 +1200 (NZST) Message-ID: <3B41A20F.9020105@claudia.dyn.dhs.org> Date: Tue, 03 Jul 2001 22:44:31 +1200 From: pete User-Agent: Mozilla/5.0 (X11; U; Linux 2.2.19-10mdk i686; en-US; m18) Gecko/20010119 X-Accept-Language: en MIME-Version: 1.0 To: tomcat-user@jakarta.apache.org Subject: Re: Programmatic security with servlet mappings in tomcat References: <086757ACB14DD211A2B900805FBB0B8D07A4FADA@OSL01> <3B40FCF6.9030005@claudia.dyn.dhs.org> <3B4182E9.8464CDC@teamware.com> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Rating: h31.sny.collab.net 1.6.2 0/1000/N Sure, one is that i want custom login screens, another is that we store all our authentication details centrally and query for them via an XML data service. Various user and domain-specific data, including user preferences,roles etc. is stored in this repository, not just 'yes, this user has blanket access to the site'. Our permissions-management tools are all written to work with this, so i have an existing system i must fit my tomcat-based solutions into here. I do use tomcat's basic authentication facilities for some unrelated services, but for us it makes a lot of sense to centralize authentication and preference data this way. If someone writes an app that doesn't protect the page? well, then the page is unprotected. Security never comes completely for 'free', and in my experience it is beneficial to place some onus on the developer to at least think about security during the course of development. YMMV, of course, but this approach has worked well for us. -Pete > Pete, > > > Interesting that you don't use the container's authentication mechanism > to protect pages. What if someone writes an app that doesn't protect > the page. Any reason why you chose this route? > > Rgds > Antony