File APIs for Java Developers
Manipulate DOC, XLS, PPT, PDF and many others from your application.
http://aspose.com/file-tools
The moose likes Web Component Certification (SCWCD/OCPJWCD) and the fly likes Programmatic vs Declarative Security Big Moose Saloon
  Search | Java FAQ | Recent Topics | Flagged Topics | Hot Topics | Zero Replies
Register / Login
JavaRanch » Java Forums » Certification » Web Component Certification (SCWCD/OCPJWCD)
Bookmark "Programmatic vs Declarative Security" Watch "Programmatic vs Declarative Security" New topic
Author

Programmatic vs Declarative Security

al nik
Ranch Hand

Joined: Oct 18, 2007
Posts: 60
Hy
I don't understand if declarative is better than programmatic security.
The HFJS says that! I used the declarative approach with struts that if I remember use container security.. but I used also some programmatic s. with Acegi&Spring and I think that's better.
The book is quite old.. so today, if you have to choose, is programmatic security a better way then declarative?
ciao


SCJP5 - SCWCD5 - SCBCD5
Ulf Dittmer
Marshal

Joined: Mar 22, 2005
Posts: 41823
    
  63
It's not possible to make blanket statements that say one is better than the other, not in the past, and not now. Both approaches have advantages and drawbacks.

Declarative (or container) security lets you keep just about all handling of users and roles out of the code, using just Servlet API methods. Thus the code remains completely portable, and everything can be configured outside of the code.

Programmatic security has the advantage of being more flexible. In some cases it is not possible to map user roles to URLs, at least not without looking at URL parameters (which declarative security can't do).

In general, the larger a system is, the more likely it is that you'll run into something that declarative security can't handle, or where you'll need to use a more advanced API like JAAS.


Ping & DNS - my free Android networking tools app
 
I agree. Here's the link: http://aspose.com/file-tools
 
subject: Programmatic vs Declarative Security