This week's book giveaway is in the Reactive Progamming forum.
We're giving away four copies of Reactive Streams in Java: Concurrency with RxJava, Reactor, and Akka Streams and have Adam Davis on-line!
See this thread for details.
Win a copy of Reactive Streams in Java: Concurrency with RxJava, Reactor, and Akka Streams this week in the Reactive Progamming forum!
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Liutauras Vilda
  • Junilu Lacar
  • Jeanne Boyarsky
  • Bear Bibeault
Sheriffs:
  • Knute Snortum
  • Tim Cooke
  • Devaka Cooray
Saloon Keepers:
  • Ron McLeod
  • Stephan van Hulst
  • Tim Moores
  • Tim Holloway
  • Carey Brown
Bartenders:
  • Piet Souris
  • Frits Walraven
  • Ganesh Patekar

ACL performance

 
Ranch Hand
Posts: 68
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Are there included in the book any indications and tips about the performance of ACL?
I know that in case of many permissions and targets this is a critical point.

I have some questions to gain the maximum performance.
When are the permissions loaded in memory(from db) and in which scope?(application,session - for web application)
If the user updates a permission when shall be the change reflected? Right away, after re-login.
If the user updates a permission what is the best strategy to reflect the change? Right away, after re-login?
Shall be the entire list of permissions reloaded from the database?

Thank you.
 
Author
Posts: 84
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Hello Ionut,

Great question - we do cover ACLs and performance considerations to a point, including going through some sample scalability calculations. We do cover some aspects of runtime, dynamic ACL manipulation and how ACL caching works in some of the scenarios you mention.

Unfortunately, we can't cover every aspect of extremely complex ACL scenarios (whole books have been written about ACLs and similarly complex security topics!), but I think the book does a pretty thorough job of covering this complex (and largely undocumented) topic.

I hope this answers your question!

Best,
Peter
 
Ionut Bucurescu
Ranch Hand
Posts: 68
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Yes, thank you Peter.
 
It is sorta covered in the JavaRanch Style Guide.
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
Boost this thread!