From jboss-identity-commits at lists.jboss.org Tue Oct 6 17:03:10 2009
Content-Type: multipart/mixed; boundary="===============1846491685693577461=="
MIME-Version: 1.0
From: jboss-identity-commits at lists.jboss.org
To: jboss-identity-commits at lists.jboss.org
Subject: [jboss-identity-commits] JBoss Identity SVN: r819 -
authz/trunk/documentation/reference-guide/en/modules.
Date: Tue, 06 Oct 2009 17:03:10 -0400
Message-ID: <200910062103.n96L3AAg012131@svn01.web.mwc.hst.phx2.redhat.com>
--===============1846491685693577461==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Author: sohil.shah(a)jboss.com
Date: 2009-10-06 17:03:10 -0400 (Tue, 06 Oct 2009)
New Revision: 819
Modified:
authz/trunk/documentation/reference-guide/en/modules/introduction.xml
Log:
introduction chapter
Modified: authz/trunk/documentation/reference-guide/en/modules/introduction=
.xml
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
--- authz/trunk/documentation/reference-guide/en/modules/introduction.xml 2=
009-10-06 19:18:36 UTC (rev 818)
+++ authz/trunk/documentation/reference-guide/en/modules/introduction.xml 2=
009-10-06 21:03:10 UTC (rev 819)
@@ -26,25 +26,32 @@
Clean Separation between Security Logic and Application Logic=
- =
+ Security Enforcement should be considered a cr=
oss cutting concern just like container managed Transactions. This allows e=
asy customization
+ of an application's security policy without having to modify the co=
re application codebase. This framework allows decoupling of both security logic
+ and security data/metadata from the core appli=
cation.
Flexibility to apply Security Logic to arbitrary Runtime info=
rmation
- =
+ A good security framework takes into account arbitrary runtime stat=
e of an application while trying to make an access control decision. Most f=
rameworks are satisfied
+ with merely associating roles/group/membership to protected resourc=
es. A security framework allows decision making based on other runtime stat=
e of the system like, "current time of the day",
+ "allowed range of ip addresses", "the user's age", etc. This framew=
ork uses a XACML specification based rule engine to enable <=
emphasis>Rule based Access Control.
Runtime Management of Security Policy
- =
+ Besides access control, policy provisioning is the other aspect o=
f a security framework. Security policies should be provisioned dynamically=
without requiring system
+ restarts. It should also provide a consistent API to build provis=
ioning tools to manage these policies. Depending upon the requirements of t=
he application the tools can be
+ xml configuration based, GUI based, and/or integrated into centra=
l monitoring tools like JOPR and JON. =
A user friendly Developer API
- =
+ The framework exposes an easy to use component oriented developer A=
PI for portability of the security layer across multiple applications and/o=
r multiple infrastructure layers of
+ the same application.
=
--===============1846491685693577461==--