Skip to content
This repository was archived by the owner on Jan 28, 2019. It is now read-only.

Commit b7ee5eb

Browse files
committed
Included review comments from Will and fixed links.
1 parent 8dfef87 commit b7ee5eb

File tree

4 files changed

+22
-13
lines changed

4 files changed

+22
-13
lines changed

src/main/jbake/content/security-javaee002.adoc

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -153,11 +153,12 @@ authentication will be used to verify the identity of the user.
153153
It is important to keep in mind that security roles are used to define
154154
the logical security view of an application. They should not be confused
155155
with the user groups, users, principals, and other concepts that exist
156-
in GlassFish Server. Note that he Java EE Security API requires that group
157-
principal names be mapped to roles of the same name by default. You do not
158-
need to perform any additional steps to map the roles
156+
in GlassFish Server. Note that the Java EE Security API requires that group
157+
principal names be mapped to roles of the same name by default, but that implementations
158+
of the standard may allow configuration of a different default. In GlassFish Server,
159+
you do not need to perform any additional steps to map the roles
159160
defined in the application to users, groups, and principals that are the
160-
components of the user database in the `file` realm of GlassFish Server.
161+
components of the user database in the `file` realm.
161162
This mapping is set by default in the GlassFish Server Administration Console
162163
as described in link:security-intro005.html#BNBXV[Mapping
163164
Roles to Users and Groups].
@@ -413,14 +414,14 @@ authenticated caller's Subject. This method returns an empty
413414
`Set` if the caller is unauthenticated, or if the requested type is not found.
414415
+
415416
Where both a container caller principal and an application caller principal
416-
are present, the value returned by `getName()` MUST be the same for both
417+
are present, the value returned by `getName()` is the same for both
417418
principals.
418419
419420
* `isCallerInRole()` takes a String argument that represents the role to be
420421
tested. The specification does not define how the role determination is made,
421-
but the result MUST be the same as if the corresponding container-specific call
422-
had been made (for example `EJBContext.isCallerInRole()`), and MUST be consistent with the result implied
423-
by other specifications that prescribe role-mapping behavior.
422+
but the result must be the same as if the corresponding container-specific call
423+
had been made (for example `EJBContext.isCallerInRole()`), and must be consistent with
424+
the result implied by specifications that prescribe role-mapping behavior.
424425
425426
The `javax.ejb.EJBContext` interface provides two methods that allow the
426427
bean provider to access security information about the enterprise bean's

src/main/jbake/content/security-webtier002.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -412,6 +412,8 @@ but instead by invoking `SecurityContext.authenticate()` with the credentials th
412412
collected.
413413
|=======================================================================
414414

415+
416+
415417
[[GEXFA]]
416418

417419
.*Figure 51-2 Form-Based Authentication*

src/main/jbake/content/security-webtier003.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -184,15 +184,15 @@ available only from the application principal. This method returns an empty
184184
`Set` if the caller is unauthenticated, or if the requested type is not found.
185185
+
186186
Where both a container caller principal and an application caller principal
187-
are present, the value returned by `getName()` MUST be the same for both
187+
are present, the value returned by `getName()` is the same for both
188188
principals.
189189

190190
* `isCallerInRole()` takes a String argument that represents the role to be
191191
tested. The specification does not define how the role determination is made,
192-
but the result MUST be the same as if the corresponding container-specific call
192+
but the result must be the same as if the corresponding container-specific call
193193
had been made (for example `HttpServletRequest.isUserInRole()`,
194-
`EJBContext.isCallerInRole()`), and MUST be consistent with the result implied
195-
by other specifications that prescribe role-mapping behavior.
194+
`EJBContext.isCallerInRole()`), and must be consistent with the result implied
195+
by specifications that prescribe role-mapping behavior.
196196

197197
Servlet 4.0 specifies the following methods that enable you to access
198198
security information about the component's caller.

src/main/jbake/content/toc.adoc

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2719,8 +2719,14 @@ link:security-api.html#using-the-java-ee-security-api[53 Using the Java EE Secur
27192719
27202720
* link:security-api004.html#running-the-built-in-database-identity-store-example[Running the Built-In Database Identity Store Example]
27212721
** link:security-api004.html#overview-of-the-built-in-database-identity-store-example[Overview of the Built-In Database Identity Store Example]
2722+
*** link:security-api004.html#define-the-users-and-groups-in-the-identity-store[Define the Users and Groups in the Identity Store]
2723+
*** link:security-api004.html#map-the-databaseidentitystore-to-the-default-data-source[Map the DatabaseIdentityStore to the Default Data source]
2724+
*** link:security-api004.html#specify-the-authentication-mechanism[Specify the Authentication Mechanism]
2725+
*** link:security-api004.html#declare-roles-in-the-servlet-container[Declare Roles in the Servlet Container]
27222726
** link:security-api004.html#running-the-built-in-db-identity-store-example[Running the built-in-db-identity-store Example]
2723-
2727+
*** link:security-api004.html#to-build-package-and-deploy-the-built-in-db-identity-store-example-using-netbeans-ide[To Build, Package, and Deploy the built-in-db-identity-store Example Using NetBeans IDE]
2728+
*** link:security-api004.html#to-build-package-and-deploy-the-built-in-db-identity-store-example-using-using-maven[To Build, Package, and Deploy the built-in-db-identity-store Example Using Maven]
2729+
*** link:security-api004.html#to-run-the-built-in-db-identity-store-example[To Run the built-in-db-identity-store Example]
27242730
* link:security-api005.html#running-the-custom-identity-store-example[Running the Custom Identity Store Example]
27252731
** link:security-api005.html#overview-of-the-custom-identity-store-example[Overview of the Custom Identity Store Example]
27262732
** link:security-api005.html#running-the-custom-identity-store-example[Running the custom-identity-store Example]

0 commit comments

Comments
 (0)