Win a copy of Head First Android this week in the Android forum!
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Tim Cooke
  • Campbell Ritchie
  • Paul Clapham
  • Ron McLeod
  • Liutauras Vilda
Sheriffs:
  • Jeanne Boyarsky
  • Rob Spoor
  • Bear Bibeault
Saloon Keepers:
  • Jesse Silverman
  • Tim Moores
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
Bartenders:
  • Piet Souris
  • Al Hobbs
  • salvin francis

Core Security Paterns Question

 
Ranch Hand
Posts: 99
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
I am most likely will be buying the book shortly, just wanted to get an idea from anyone who have ready the book or from the authors if there is topics covering integrating Container managed security with the Domain application, I am not just talking about defining a realms and roles and having a form, I was thinking that it must be possible to somehone adopt the container security with, for example, application securityManager so that they work in tandem, meaning users and roles and the objects that container uses for security can be shared with application.
I hope I made sence with this qeustion.
 
Greenhorn
Posts: 23
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Levani,
We cover container managed security in Chapter 10 and touch on it in other chapters as well. In fact, Container Managed Security is one of our business tier patterns (pg. 635)
 
levani dvalishvili
Ranch Hand
Posts: 99
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
thanks for the quick reply,
second thing I wanted to ask....
does book talk about Single Sign on?
 
Greenhorn
Posts: 5
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Does the book covers security patterns with WebServices? If so, what are new enhancement and techniques in implementing security patters?

Keep on smilin

-thanks-
 
Author
Posts: 159
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator

Originally posted by levani dvalishvili:
thanks for the quick reply,
second thing I wanted to ask....
does book talk about Single Sign on?



The book dedicates a chapter on "IDentity Management" discussing SAML and Liberty Alliance empasizing the Single sign-on and federated single sign-on concepts as well.

In addition, this book presents three security patterns related to SSO :
SSO Delegator
Assertion Builder
Credential Tokenizer

Thanks for choosing CSP.

/Ramesh
[ January 11, 2006: Message edited by: Ramesh Nagappan ]
 
Ramesh Nagappan
Author
Posts: 159
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator

Originally posted by Jonathan Viray:
Does the book covers security patterns with WebServices? If so, what are new enhancement and techniques in implementing security patters?

Keep on smilin

-thanks-



Jonathan,

The book covers 3 security patterns addressing Web services Security.

Message Interceptor Gateway
Message Inspector
Secure Message Router

For brief description,Take a look at the patterns caalog posted in the book web site.

/Ramesh
reply
    Bookmark Topic Watch Topic
  • New Topic