|
Configuration
IntroductionFirst of all, we need to configure the domain security mechanism. The first step is relatively simple: configure JBoss AOP to call the jdobjs interceptors. The second step is about to configure how the interceptors load the security rules and how the user credentials are obtained. Finally, the last step is to write the application security rules. Configuration StepsConfiguring JBoss AOPThe JBoss AOP configuration mechanism is quite simple and is thoroughly described at the JBoss AOP Reference Guide, chapter 8. The Joinpoint and Pointcut expressions can be configured using the annotations defined in the module annotations or with any other annotations or regular expressions. It is important to emphasize that there are two diferent interceptors that can be configured:
In some cases is usefull to intercept the same method by the two interceptors and this can be done with no trouble. Configuring jdobjsConfiguring the Security Rules |