< Day Day Up > |
5.3 AuthenticationThe EJB specification does not directly address the issue of authentication and the authentication process. Most of the specification deals with authenticated principals and the actions they can take, such as invoking EJB methods. In most respects, the model follows a simplified version of the Common Object Request Broker Architecture (CORBA) security model. Authentication is the responsibility of the EJB container and could be implemented using JAAS, as described in Chapter 9 on page 289. It is the EJB Container Provider's responsiblity to use, as appropriate, existing authentication mechanisms provided by the underlying platforms or security providers. In the CORBA authentication model, an ORB, such as RMI-IIOP, receives a method invocation request and examines the security attributes of the request prior to method dispatch. If the principals are authenticated, the process moves on to the authorization phase. Aside from the authorization process, the result of authentication appears in several places. In particular, EJB technology includes the concept of a security role. A security role is a set of J2EE permissions to make it easier for the Deployer and the System Administrator to administer authorization. When a client attempts to access an EJB method, the calling principal is logically assigned to zero or more security roles defined by the application, as configured by the Deployer. For the Enterprise Bean Provider, authenticated-user information appears in two methods in the EJBContext interface, as described in Section 5.2.1.3 on page 167.
From an authentication perspective, the EJB Container Provider is responsible for providing tools and runtime support for
|
< Day Day Up > |
No comments:
Post a Comment