index.html 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167
  1. <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
  2. <HTML><HEAD><TITLE>Acegi Security System for Spring</TITLE>
  3. <META http-equiv=Content-Type content="text/html; charset=windows-1252">
  4. <META content="MSHTML 6.00.2900.2180" name=GENERATOR></HEAD>
  5. <BODY>
  6. <CENTER>
  7. </CENTER><BR><BR><FONT
  8. face=Arial size=-1>
  9. <CENTER><B>
  10. <HR>
  11. <CENTER>Mission Statement</CENTER></B>
  12. <HR>
  13. <BR>To provide comprehensive security services for <A
  14. href="http://www.springframework.org/"><I>The Spring Framework</I></A>.
  15. </CENTER><BR><B>
  16. <HR>
  17. <CENTER>Key Features</CENTER></B>
  18. <HR>
  19. <BR>
  20. <UL>
  21. <LI><B>It is ready NOW.</B> As explained in the reference guide, the API
  22. is now quite stable. We also use the <A
  23. href="http://apr.apache.org/versioning.html">Apache APR Project
  24. Versioning Guidelines</A> so you can identify backward
  25. compatibility.<BR><BR>
  26. <LI><B>Fast results:</B> View our <a href="suggested.html">Suggested Steps</a>
  27. for the fastest way to develop complex, security-compliant applications.<BR><BR>
  28. <LI><B>Enterprise-wide single sign on:</B> Using Yale University's open
  29. source <A href="http://www.yale.edu/tp/auth/">Central Authentication
  30. Service</A> (CAS), the Acegi Security System for Spring can participate
  31. in an enterprise-wide single sign on environment. You no longer need
  32. every web application to have its own authentication database. Nor are
  33. you restricted to single sign on across a single web container. Advanced
  34. single sign on features like proxy support and forced refresh of logins
  35. are supported by both CAS and Acegi Security.<BR><BR>
  36. <LI><B>Reuses your Spring expertise:</B> We use Spring application
  37. contexts for all configuration, which should help Spring developers get
  38. up-to-speed nice and quickly.<BR><BR>
  39. <LI><B>Domain object instance security:</B> In many applications it's
  40. desirable to define Access Control Lists (ACLs) for individual domain
  41. object instances. We provide a comprehensive ACL package with features
  42. including integer bit masking, permission inheritence (including
  43. blocking), a JDBC-backed ACL repository, caching and a pluggable,
  44. interface-driven design.<BR><BR>
  45. <LI><B>Non-intrusive setup:</B> The entire security system can operate
  46. within a single web application using the provided filters. There is no
  47. need to make special changes or deploy libraries to your Servlet or EJB
  48. container.<BR><BR>
  49. <LI><B>Full (but optional) container integration:</B> The credential
  50. collection and authorization capabilities of your Servlet or EJB
  51. container can be fully utilised via included "container adapters". We
  52. currently support Catalina (Tomcat), Jetty, JBoss and Resin, with
  53. additional containers easily added.<BR><BR>
  54. <LI><B>Keeps your objects free of security code:</B> Many applications
  55. need to secure data at the bean level based on any combination of
  56. parameters (user, time of day, authorities held, method being invoked,
  57. parameter on method being invoked....). This package gives you this
  58. flexibility without adding security code to your Spring business
  59. objects.<BR><BR>
  60. <LI><B>After invocation security:</B> Acegi Security can not only protect
  61. methods from being invoked in the first place, but it can also
  62. deal with the Objects returned from the methods. Included implementations
  63. of after invocation security can throw an exception or mutate the returned
  64. object based on ACLs.<BR><BR>
  65. <LI><B>Secures your HTTP requests as well:</B> In addition to securing
  66. your beans, the project also secures your HTTP requests. No longer is it
  67. necessary to rely on web.xml security constraints. Best of all, your
  68. HTTP requests can now be secured by your choice of regular expressions
  69. or Apache Ant paths, along with pluggable authentication, authorization
  70. and run-as replacement managers.<BR><BR>
  71. <LI><B>Channel security:</B> The Acegi Security System for Spring can
  72. automatically redirect requests across an appropriate transport channel.
  73. Whilst flexible enough to support any of your "channel" requirements (eg
  74. the remote user is a human, not a robot), a common channel security
  75. feature is to ensure your secure pages will only be available over
  76. HTTPS, and your public pages only over HTTP. Acegi Security also
  77. supports unusual port combinations and pluggable transport decision
  78. managers.<BR><BR>
  79. <LI><B>Supports HTTP BASIC authentication:</B> Perfect for remoting
  80. protocols or those web applications that prefer a simple browser pop-up
  81. (rather than a form login), Acegi Security can directly process HTTP
  82. BASIC authentication requests as per RFC 1945.<BR><BR>
  83. <LI><B>Convenient security taglib:</B> Your JSP files can use our taglib
  84. to ensure that protected content like links and messages are only
  85. displayed to users holding the appropriate granted authorities. The taglib
  86. also fully integrates with Acegi Security's ACL services.<BR><BR>
  87. <LI><B>Application context or attribute-based configuration:</B> You
  88. select the method used to configure your security environment. The
  89. project supports configuration via Spring application contexts as well
  90. as Jakarta Commons Attributes.<BR><BR>
  91. <LI><B>Various authentication backends:</B> We include the ability to
  92. retrieve your user and granted authority definitions from either an XML
  93. file or JDBC datasource. Alternatively, you can implement the
  94. single-method DAO interface and obtain authentication details from
  95. anywhere you like.<BR><BR>
  96. <LI><B>Event support:</B> Building upon Spring's
  97. <CODE>ApplicationEvent</CODE> services, you can write your own listeners
  98. for authentication-related events, along with authorisation-related events.
  99. This enables you to implement account lockout and audit log systems, with
  100. complete decoupling from Acegi Security code.<BR><BR>
  101. <LI><B>Easy integration with existing databases:</B> Our implementations
  102. have been designed to make it very easy to use your existing
  103. authentication schema and data (without modification). Of course,
  104. you can also provide your own Data Access Object if you wish.<BR><BR>
  105. <LI><B>Caching:</B> Acegi Security integrates with Spring's <A
  106. href="http://ehcache.sourceforge.net/">EHCACHE</A> factory.
  107. This flexibility means your database (or other authentication
  108. repository) is not repeatedly queried for authentication
  109. information.<BR><BR>
  110. <LI><B>Pluggable architecture:</B> Every critical aspect of the package
  111. has been modelled using high cohesion, loose coupling, interface-driven
  112. design principles. You can easily replace, customise or extend parts of
  113. the package.<BR><BR>
  114. <LI><B>Startup-time validation:</B> Every critical object dependency and
  115. configuration parameter is validated at application context startup
  116. time. Security configuration errors are therefore detected early and
  117. corrected quickly.<BR><BR>
  118. <LI><B>Remoting support:</B> Does your project use a rich client? Not a
  119. problem. Acegi Security integrates with standard Spring remoting
  120. protocols, because it automatically processes the HTTP BASIC
  121. authentication headers they present. Add our BASIC authentication filter
  122. to your web.xml and you're done.<BR><BR>
  123. <LI><B>Advanced password encoding:</B> Of course, passwords in your
  124. authentication repository need not be in plain text. We support both SHA
  125. and MD5 encoding, and also pluggable "salt" providers to maximise
  126. password security.<BR><BR>
  127. <LI><B>Run-as replacement:</B> The security system fully supports
  128. temporarily replacing the authenticated user for the duration of the web
  129. request or bean invocation. This enables you to build public-facing
  130. object tiers with different security configurations than your backend
  131. objects.<BR><BR>
  132. <LI><B>Transparent security propagation:</B> Acegi Security can automatically
  133. transfer its core authentication information from one machine to another,
  134. using a variety of protocols including RMI and Spring's HttpInvoker.<BR><BR>
  135. <LI><B>Compatible with HttpServletRequest.getRemoteUser():</B> Even though
  136. Acegi Security can deliver authentication using a range of pluggable mechanisms
  137. (most of which require no web container configuration), we allow you to access
  138. the resulting Authentication object via the getRemoteUser() method.<BR><BR>
  139. <LI><B>Unit tests:</B> A must-have of any quality security project, unit
  140. tests are included. Our unit test coverage is very high, as shown in the
  141. <a href="multiproject/acegi-security/clover/index.html">coverage report</a>.<BR><BR>
  142. <LI><B>Built by Maven:</B> This assists you in effectively reusing the Acegi
  143. Security artifacts in your own Maven-based projects.<BR><BR>
  144. <LI><B>Supports your own unit tests:</B> We provide a number of classes
  145. that assist with your own unit testing of secured business objects. For
  146. example, you can change the authentication identity and its associated
  147. granted authorities directly within your test methods.<BR><BR>
  148. <LI><B>Peer reviewed:</B> Whilst nothing is ever completely secure,
  149. using an open source security package leverages the continuous design
  150. and code quality improvements that emerge from peer review.<BR><BR>
  151. <LI><B>Thorough documentation:</B> All APIs are fully documented using
  152. JavaDoc, with a 40+ page reference guide providing an easy-to-follow
  153. introduction. More documentation is provided on this web site, as
  154. shown in the left hand navigation sidebar.<BR><BR>
  155. <LI><B>Apache license.</B><BR><BR></LI></UL><BR><B>
  156. <HR>
  157. <CENTER>Project Resources</CENTER></B>
  158. <HR>
  159. <BR>
  160. <CENTER><A href="http://forum.springframework.org/"><B>Support
  161. Forums</B></A><BR><BR><A
  162. href="http://sourceforge.net/project/showfiles.php?group_id=104215"><B>Downloads</B></A>
  163. </CENTER></FONT>
  164. </BODY></HTML>