This week's book giveaway is in the Reactive Progamming forum. We're giving away four copies of Reactive Streams in Java: Concurrency with RxJava, Reactor, and Akka Streams and have Adam Davis on-line! See this thread for details.
Are there included in the book any indications and tips about the performance of ACL?
I know that in case of many permissions and targets this is a critical point.
I have some questions to gain the maximum performance.
When are the permissions loaded in memory(from db) and in which scope?(application,session - for web application)
If the user updates a permission when shall be the change reflected? Right away, after re-login.
If the user updates a permission what is the best strategy to reflect the change? Right away, after re-login?
Shall be the entire list of permissions reloaded from the database?
Great question - we do cover ACLs and performance considerations to a point, including going through some sample scalability calculations. We do cover some aspects of runtime, dynamic ACL manipulation and how ACL caching works in some of the scenarios you mention.
Unfortunately, we can't cover every aspect of extremely complex ACL scenarios (whole books have been written about ACLs and similarly complex security topics!), but I think the book does a pretty thorough job of covering this complex (and largely undocumented) topic.
I hope this answers your question!
Author, Spring Security 3 (the Book), Packt Publishing, 2010