security-roles Questions

2

Solved

How do I set the role prefix to "" with a custom user details service in Spring? <beans:bean id="authService" class="com.cisco.badges.business.services.AuthenticationService"/> <authent...
Stockmon asked 9/2, 2011 at 23:33

1

There are three default security roles in CloudKit: World Authenticated Creator And three permissions: Create Read Write How do these security roles and permissions work? Here are example...
Waffle asked 12/7, 2015 at 15:1

6

Solved

In Spring Security we use the intercept-url tag to define the access for URLs as below: <intercept-url pattern="/**" access="ROLE_ADMIN" /> <intercept-url pattern="/student" access="ROLE_...
Brackely asked 31/7, 2011 at 23:36

2

Solved

After reading http://en.wikipedia.org/wiki/Role-based_access_control and seeing the way people are building authorization/access control, this question came to my mind "Why we are checking roles of...
Wagonage asked 7/1, 2014 at 18:29

2

Solved

I know Spring Security is good for standard role and permission based authorisation. What I'm not sure is this scenario: There are 10,000 employees managed in the system, employees organised into ...
Lakendra asked 10/7, 2012 at 0:7

3

Solved

I have mvc application and I'm working with poco objects and writing unit test. Problem is that all my test fail when they reach this line of code Roles.IsUserInRole("someUser", "role"). Should I i...

1

Solved

I run JavaEE 6 web application on Glassfish 3. I use JAAS with jdbcRealm and default principal to role mapping. In my database I have table for mapping usernames to their roles: username | role -...
Rabid asked 5/3, 2013 at 12:4

2

Solved

I've been reading about AngularJS and it seems very promising, the only thing I'm trying to figure out, not specific for framework, but it's general for client-side template. Let's say you have a ...
Abney asked 21/10, 2012 at 7:59

2

Solved

A lot of articles online on role based access speak of applying something like this to ensure role based access to a controller or action [Authorize(Roles = "Admin, Manager")] public class SomeCon...
Osugi asked 7/3, 2012 at 12:21

2

I am trying to make sure that all users have been assigned a particular role. Is there any view or SQL query for getting this information?
Marketable asked 6/10, 2011 at 0:20

2

Is it possible to add the Roles but not hard-coding the values like: [Authorize(Roles="members, admin")] I would like to retrieve these roles from a database or configuration file where I wouldn...
Bronchoscope asked 28/1, 2012 at 8:3

1

We have a security module which, based on group/role membership, controls permissions to resources in ASP.Net. I've built a custom ASP.Net Role Provider that queries Active Directory for group memb...

2

Solved

I'm currently looking into the spring-security framework - great stuff so far, pretty impressed. However, I haven't found out where or how to define a inheritance of permissions. e.g. I want the R...
Alida asked 6/6, 2011 at 16:42

1

Solved

I'm starting to implement authorization and authentication mechanism using LDAP, for some existing system. On the development stage, I'm facing a difficult design decision: where should user roles ...
Ossiferous asked 5/6, 2011 at 21:37

7

Solved

I have an ASP.Net website with multiple roles, each with access to a separate directory (i.e. admin users can access /admin, shoppers can access /shop etc), using a shared login page. If someone vi...
Substantiate asked 26/6, 2009 at 10:55

2

Solved

What is the difference between ROLE_USER and ROLE_ANONYMOUS in a Spring intercept url configuration such as the example below? <http auto-config="false" access-decision-manager-ref="accessDecis...
Aspirant asked 8/8, 2010 at 19:47

1

Solved

A precursor: I've worked now in two enviroments with conflicting principals on this. I am outlining the competing ideas and would like to know which is 'correct' given the scenario described. Scen...
Medeiros asked 29/7, 2010 at 14:1

9

I have medium sized MySQL database with a primary "persons" table which contains basic contact information about every human being connected to the theatre and theatre school for which I am respons...
Boise asked 8/1, 2009 at 20:14

2

Solved

The production change implementers for our IT group have been tasked with reviewing the security for all of the various objects in our group, primarily to make sure that people who have left our em...
Strunk asked 20/2, 2009 at 15:40

1

Solved

I'm struggling to implement ACL in CakePHP. After reading the documentation in the cake manual as well as several other tutorials, blog posts etc, I found Aran Johnson's excellent tutorial which ha...
Hydrastinine asked 10/9, 2008 at 14:39
1

© 2022 - 2024 — McMap. All rights reserved.