security « Development « JPA Q&A





1. data 'security' with java and hibernate    stackoverflow.com

The system I am currently working on requires some role-based security, which is well catered for in the Java EE stack. The system intends to be a framework for business domain ...

2. JAAS / JAAC, DROOLS, or custom    stackoverflow.com

I have been using my own internal custom authorization model which evaluates whether a user has permission to view, edit, delete, or create an item. For instance, one place I ...

3. Hibernate Recepies: security issues    coderanch.com

4. ZK / JPA / Shiro Security    zkoss.org

Yes, this sounds like a ThreadLocal issue. ZK uses ThreadLocals heavily, so if ZK code is executed in another Thread, the ThreadLocals must be copied.I'm not familiar with Shiro, but I'm guessing it uses ThreadLocals just like Spring Security. Also, if Shiro uses some kind of custom threading, the ZK ThreadLocals have to be copied into Shiro threads.

5. Row Level Security in Hiibernate    forum.hibernate.org

I am considering implementing row level security using the Interceptor method for my application. I know I need extend the EmptyInterceptor, but have a question about when methods are called. When an object is loaded from the database, the interceptor's onLoad event is called. Once it is loaded, it is maintained in the cache until such time as the space needs ...

6. Security Manager and Hibernate    forum.hibernate.org

Good afternoon, ladies and gentlemen, I have biult a web application using Hibernate for java. The application works fine on my local machine without SecurityManager, but when it is deployed on the remote server, the following exception is thrown: Sep 23, 2010 3:07:12 PM org.apache.catalina.core.StandardWrapperValve invoke INFO: java.security.AccessControlException: access denied (java.lang.RuntimePermission accessClassInPackage.sun.jdbc.odbc) at java.security.AccessControlContext.checkPermission(AccessControlContext.java:323) at java.security.AccessController.checkPermission(AccessController.java:546) at java.lang.SecurityManager.checkPermission(SecurityManager.java:532) at java.lang.SecurityManager.checkPackageAccess(SecurityManager.java:1512) at ...

7. Environment class doesn't work with security manager enabled    forum.hibernate.org

I'm in the process of deploying an app to my ISP, who is running Tomcat 4.1.29 and has the security manager enabled. Since there are many applications running he will only allow specific system properties to be read. I'm currently getting an exception (stack trace below) and have traced it back to the cirrus.hibernate.Environment class. For some reason Environment is calling ...

8. Hibernate security    forum.hibernate.org

Hi all. Does anyone know a way or found a way of implementing read/search permissions on hibernate. At the moment I have a system of protecting the database against unauthorised update(), save(), delete() by implementing Lifecycle and using the functions there. But I can't find a way of doing the same for find() and get(). I can implement my own checking ...

9. Data Level Security Practices in Hibernate ?    forum.hibernate.org

anjali wrote: Has anyone come across any best practices for data-level security in Hibernate? Any source of information, links etc ? The best practice for security reasons is not to have security in Hibernate :) Application level security for data is the same as application level data validation, it is more UI helper than security. If you need security then use ...





10. Declarative Security and Hibernate    forum.hibernate.org

Container Managed is all I need. It does the things I want, and does it nicely. JAAS is overkill. Problem is. 1) This method of security wants to use a UserName field in the user table (what the user enters, which would be a business key), and not the real key. Sure, I can make a unique contraint/index on it. It ...

11. Security Policy on RDBMS rows    forum.hibernate.org

Folks, In a customized struts framework with Hibernate in data layer, we've designed and implemented a user management, authentication and authorization system. Users may connect to this system and see some menus. Beside this and some other security levels, we have to set a security policy on rdbms ROWS. There are some ways to do. One, is to use Oracle Security ...

12. Command + Command Handler and J2EE declarative security    forum.hibernate.org

In chapter 8 of "Hibernate In Action" I see recommendations to use Command design pattern. I like this approach, because ... (read the book:), but how to use EJB container declarative security with this design. If you have only one Session Facade Bean to handle all commands how to limit some roles to handle some commands? Is there some solution? -- ...

13. Row Level Security    forum.hibernate.org

14. Security for domain objects with Hibernate    forum.hibernate.org

Hi there, This is a bit of an general question but.. We have just implemented a clean, transparent domain POJO layer for our application and developed Hibernate DAOs for persistence. Right now our application has no security. No we're not live yet. ;-) We have several kinds of authorization requirements. 1. Service layer authorizations -> Can principal x execute service method ...

15. Security Data    forum.hibernate.org

16. using a data-source with to authenti    forum.hibernate.org

when I log in to my J2EE web application I would like to use those same credentials to obtain a connection to the database. So when I configure my data-source, instead of hard-coding the username/password, I would like to specify the to use some security realm to authenticate the user in the database. Has anyone done this successfully? the problem ...





17. Hibernate.org security    forum.hibernate.org

18. A question about declaritive security    forum.hibernate.org

No interfaces to implement. But I'm not sure that the docs for configuring this stuff are up to date. And we've only been testing this stuff in the context of EJB3, so I'm not sure what is the exact status of thie stuff in the Hibernate standalone case. I know that in 3.0.0 this was all broken, but we (not me ...

19. SUN AppServer PE 8.2 with Hibernate security problems    forum.hibernate.org

All, I have an EAR (EJB + WEB) successfully deployed and working on JBoss 4.0.3SP1, IBM WebSphere, BEA Weblogic. I am currently trying to deploy it on SUN AppServer PE 8.2 and am running into lots of security issues. So far I had to add the following to my /home/sandeepk/apps/SUNWappserver/domains/domain1/config/server.policy file: grant { ... ... // Permission for allowing Hibernate read/write ...

20. Hibernate Security    forum.hibernate.org

21. Evaluation of declarative security via JACC    forum.hibernate.org

Hello, I'm a student and currently doing some evaluation of the declarative security feature of Hibernate. Unfortunately I can't get it running. To be more precise, I use JBoss 4.0.3, Hibernate 3.1.3 and MySQL 5.0.17 and that is what I've done so far for getting it running: I've written a SessionBean (J2EE 1.4) with a simple method named "doSimpleTest" that uses ...

23. Do you need hibernate-backed security model?    forum.hibernate.org

24. Access MDB security and NHibernate    forum.hibernate.org

Now, before I get blasted for trying to use Access as a real DB, I want to say I do know better than to use Access for what I am doing (like the John Wayne saying "you sent a boy to do a mans job"). We have a project that uses NHibernate (latest) and was implemented using MDB as the DB. ...

25. Row-Level Security in Hibernate    forum.hibernate.org