﻿<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"><channel><title>BlogJava--随笔分类-权限,安全</title><link>http://www.blogjava.net/leekiang/category/30127.html</link><description>MDA/MDD/TDD/DDD/DDDDDDD</description><language>zh-cn</language><lastBuildDate>Thu, 18 Nov 2010 16:59:35 GMT</lastBuildDate><pubDate>Thu, 18 Nov 2010 16:59:35 GMT</pubDate><ttl>60</ttl><item><title>oauth协议</title><link>http://www.blogjava.net/leekiang/archive/2010/11/18/338374.html</link><dc:creator>leekiang</dc:creator><author>leekiang</author><pubDate>Thu, 18 Nov 2010 06:12:00 GMT</pubDate><guid>http://www.blogjava.net/leekiang/archive/2010/11/18/338374.html</guid><wfw:comment>http://www.blogjava.net/leekiang/comments/338374.html</wfw:comment><comments>http://www.blogjava.net/leekiang/archive/2010/11/18/338374.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/leekiang/comments/commentRss/338374.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/leekiang/services/trackbacks/338374.html</trackback:ping><description><![CDATA[   第三方应用通过以下四个步骤来完成认证授权并访问或修改受限资源<br />   1. 获取未授权的Request Token<br />   2. 请求用户授权Request Token<br />   3. 使用授权后的Request Token换取Access Token<br />   4. 使用 Access Token 访问或修改受保护资源<br />   <br />   <br />   <br />   <br />   <br />   http://www.williamlong.info/archives/2185.html<br />   http://www.douban.com/service/apidoc/auth<br />   http://haolloyin.blog.51cto.com/1177454/412445<br />   http://haolloyin.blog.51cto.com/1177454/410776<br />   http://blog.csdn.net/hereweare2009/archive/2009/03/08/3968582.aspx<br />   http://tools.ietf.org/html/rfc5849<img src ="http://www.blogjava.net/leekiang/aggbug/338374.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/leekiang/" target="_blank">leekiang</a> 2010-11-18 14:12 <a href="http://www.blogjava.net/leekiang/archive/2010/11/18/338374.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>grails权限，Shiro等</title><link>http://www.blogjava.net/leekiang/archive/2010/05/23/321640.html</link><dc:creator>leekiang</dc:creator><author>leekiang</author><pubDate>Sat, 22 May 2010 16:34:00 GMT</pubDate><guid>http://www.blogjava.net/leekiang/archive/2010/05/23/321640.html</guid><wfw:comment>http://www.blogjava.net/leekiang/comments/321640.html</wfw:comment><comments>http://www.blogjava.net/leekiang/archive/2010/05/23/321640.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/leekiang/comments/commentRss/321640.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/leekiang/services/trackbacks/321640.html</trackback:ping><description><![CDATA[http://www.ibm.com/developerworks/cn/opensource/os-cn-shiro/index.html<br />grails-spring-security-core<br /><img src ="http://www.blogjava.net/leekiang/aggbug/321640.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/leekiang/" target="_blank">leekiang</a> 2010-05-23 00:34 <a href="http://www.blogjava.net/leekiang/archive/2010/05/23/321640.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>spring security笔记</title><link>http://www.blogjava.net/leekiang/archive/2009/02/03/253015.html</link><dc:creator>leekiang</dc:creator><author>leekiang</author><pubDate>Mon, 02 Feb 2009 19:29:00 GMT</pubDate><guid>http://www.blogjava.net/leekiang/archive/2009/02/03/253015.html</guid><wfw:comment>http://www.blogjava.net/leekiang/comments/253015.html</wfw:comment><comments>http://www.blogjava.net/leekiang/archive/2009/02/03/253015.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/leekiang/comments/commentRss/253015.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/leekiang/services/trackbacks/253015.html</trackback:ping><description><![CDATA[1,FilterSecurityInterceptor的objectDefinitionSource定义的是url与角色的关系，既可以在xml里写死，也可以自定义一个FilterInvocationDefinitionSource，实现其public ConfigAttributeDefinition getAttributes(Object filter)方法。这个关系好像也可以定义在FilterChainProxy的filterInvocationDefinitionSource<br />http://www.javaeye.com/topic/113436<br />http://www.blogjava.net/redhatlinux/archive/2008/09/01/226010.html<br />http://www.webasp.net/article/29/28097_print.htm<br /><br />定义好角色与url的关系，同时告诉acegi该用户拥有的角色，那么acegi会根据投票规则去验证是否有权限。<br /><br />2，必须要设置httpSessionContextIntegrationFilter，否则就会报<br />org.springframework.security.AuthenticationCredentialsNotFoundException: An Authentication object was not found in the SecurityContext<br /><br />3,<br />其实所有的权限问题最终可以总结为: 当前的登陆用户是谁，他拥有那些资源，<br />他现在所访问的资源是否与与其匹配。 这个就是最基本的 用户-资源 后来因用户和资源经常性变化，<br />单一的用户资源模型会导致经常性维护的麻烦，所以人们加入了角色一层，以方便更好的管理，<br />这就是 用户-角色-资源(RBAC)模型。随着系统的不断增大，用户和资源越来越多，<br />根据不同的项目的需要，人们又按需开发了不少模型，如 用户-角色-权限-资源 模型, <br />用户-角色-角色组-权限-资源 模型，用户-角色-角色组-权限-操作-资源 模型等，<br />其实无论中间加入多少层，如何扩展，也都是万变不离其宗：用户-资源。<br /><br />4，<br />手册 http://family168.com/oa/springsecurity/html/<br /><br />http://www.javaeye.com/topic/17896<br /><img src ="http://www.blogjava.net/leekiang/aggbug/253015.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/leekiang/" target="_blank">leekiang</a> 2009-02-03 03:29 <a href="http://www.blogjava.net/leekiang/archive/2009/02/03/253015.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>权限相关</title><link>http://www.blogjava.net/leekiang/archive/2008/03/18/186897.html</link><dc:creator>leekiang</dc:creator><author>leekiang</author><pubDate>Mon, 17 Mar 2008 16:30:00 GMT</pubDate><guid>http://www.blogjava.net/leekiang/archive/2008/03/18/186897.html</guid><wfw:comment>http://www.blogjava.net/leekiang/comments/186897.html</wfw:comment><comments>http://www.blogjava.net/leekiang/archive/2008/03/18/186897.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/leekiang/comments/commentRss/186897.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/leekiang/services/trackbacks/186897.html</trackback:ping><description><![CDATA[http://www.blogjava.net/RongHao/archive/2006/08/29/66389.html<br />http://www.blogjava.net/RongHao/category/20773.html<br />一个基于RBAC模型的通用权限管理系统的域模型类图http://www.javaeye.com/topic/176508<br />http://blog.csdn.net/gisfarmer/archive/2009/01/22/3849659.aspx<br /><h4><a href="http://www.moorwind.com/read.php?172">五一巨献：OAuth Actionscript3 Class Library</a></h4><br />Apache Shiro Integration for Grails<br /><br /><br />其实，你把Acegi的Role理解为Permission就好了。 然后在此之上建立自己的Business 
Role/Group，那么关系就会变成： <br /> User(1) &lt;-&gt; Role/Group(n)  用户与角色1对多 <br />
 Role/Group(1) &lt;-&gt;  Permission/Acegi Role(n) 角色与权限1对多。 <br /> 
这样就重新回到传统的RBAC模型了。 <br /> 总之，不要局限于Acegi的“Role”这个词了，把它就看成Permission，
你会豁然开朗！ <br />见http://groups.google.com.hk/group/grailsunion/browse_thread/thread/6cf3ae5f5f0a7256#<br /><img src ="http://www.blogjava.net/leekiang/aggbug/186897.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/leekiang/" target="_blank">leekiang</a> 2008-03-18 00:30 <a href="http://www.blogjava.net/leekiang/archive/2008/03/18/186897.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item></channel></rss>