Java Reference
In-Depth Information
<glassfish-web-app error-url=""
httpservlet-security-provider="AuthModule1">
<class-loader delegate="true"/>
</glassfish-web-app>
• The second method is to implement your own implementation of the
AuthConfigProvider interface.Therefore,inthiscase,youneedtoimple-
ment javax.security.auth.message.config.ServerAuthConfig ,
javax.security.auth.message.config.ServerAuthContext , and
javax.security.auth.message.config.AuthConfigProvider in-
terfaces. For those who are thrilled about the adventure, you will find all
the necessary information in this blog: http://arjan-tijms.blogspot.com/2012/
11/implementing-container-authentication.html .
Creating a realm
We will tell the GlassFish server where all the associated users and groups that can
access the secure sections of our application are stored. In other words, we will con-
figure the realm of our application.
For your information, GlassFish provides the ability to define several types of realms.
They are listed as follows:
• The file realm, for storing user information in files. This is the default realm.
• The ldap realm, for storage in an LDAP directory server.
• The jdbc realm, for storing in a database.
• The solaris realm, for authentication management based on Solaris user-
name and password.
• The certificate realm, for authentication management using certificates.
• And if none of these realms satisfy your need, don't worry; GlassFish offers
the possibility of creating your own realm.
In our case, we opt for the jdbc realm; we need a database structure to store the
necessary information (the user name, its password, and the group to which it be-
longs). The following screenshot shows the structure of tables in which our informa-
tion is stored:
Search WWH ::




Custom Search