mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-08-07 17:49:17 +00:00
Refactor subsystems for authentication chaining
- An authentication chain of size 1 configured by default - DefaultChildApplicationContextManager supports dynamic configuration of the authentication chain via Spring or JMX. Any number of instances of any type allowed in chain. - SubsystemChainingAuthenticationComponent and SubsystemChainingAuthenticationService iterate across configured chain for Authentication - SSO (NTLM / Kerberos) and CIFS authentication independently activatable for any component in chain (where supported). - SubsystemChainingProxyFactory used to proxy directly to first active CIFS authenticator or SSO filter in the chain - CIFS server knows not to bother starting if authentication chain doesn't have an active CIFS authenticator (e.g. LDAP only) - Rationalization of subsystem configuration folder structure and JMX object naming - Classpath based extension mechanism for community edition - alfresco/extension/subsystems/<category>/<typeName>/<id>/*.properties in classpath can be used to configure specific subsystem instances - Simplification of JMX infrastructure. No longer Spring bean definition based, thus allowing dynamic creation/registration of new instances at runtime. - New AuthenticationChainTest unit test git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@14030 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
This commit is contained in:
@@ -30,7 +30,6 @@ import net.sf.acegisecurity.UserDetails;
|
||||
import net.sf.acegisecurity.providers.dao.UsernameNotFoundException;
|
||||
|
||||
import org.alfresco.error.AlfrescoRuntimeException;
|
||||
import org.alfresco.service.Managed;
|
||||
import org.springframework.dao.DataAccessException;
|
||||
|
||||
/**
|
||||
@@ -430,97 +429,81 @@ public class DefaultMutableAuthenticationDao implements MutableAuthenticationDao
|
||||
// Bean IOC //
|
||||
// -------- //
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowCreateUser(boolean allowCreateUser)
|
||||
{
|
||||
this.allowCreateUser = allowCreateUser;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowDeleteUser(boolean allowDeleteUser)
|
||||
{
|
||||
this.allowDeleteUser = allowDeleteUser;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowGetAccountExpiryDate(boolean allowGetAccountExpiryDate)
|
||||
{
|
||||
this.allowGetAccountExpiryDate = allowGetAccountExpiryDate;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowGetAccountHasExpired(boolean allowGetAccountHasExpired)
|
||||
{
|
||||
this.allowGetAccountHasExpired = allowGetAccountHasExpired;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowGetAccountLocked(boolean allowGetAccountLocked)
|
||||
{
|
||||
this.allowGetAccountLocked = allowGetAccountLocked;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowGetCredentialsExpire(boolean allowGetCredentialsExpire)
|
||||
{
|
||||
this.allowGetCredentialsExpire = allowGetCredentialsExpire;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowGetCredentialsExpiryDate(boolean allowGetCredentialsExpiryDate)
|
||||
{
|
||||
this.allowGetCredentialsExpiryDate = allowGetCredentialsExpiryDate;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowGetCredentialsHaveExpired(boolean allowGetCredentialsHaveExpired)
|
||||
{
|
||||
this.allowGetCredentialsHaveExpired = allowGetCredentialsHaveExpired;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowGetEnabled(boolean allowGetEnabled)
|
||||
{
|
||||
this.allowGetEnabled = allowGetEnabled;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowSetAccountExpires(boolean allowSetAccountExpires)
|
||||
{
|
||||
this.allowSetAccountExpires = allowSetAccountExpires;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowSetAccountExpiryDate(boolean allowSetAccountExpiryDate)
|
||||
{
|
||||
this.allowSetAccountExpiryDate = allowSetAccountExpiryDate;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowSetAccountLocked(boolean allowSetAccountLocked)
|
||||
{
|
||||
this.allowSetAccountLocked = allowSetAccountLocked;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowSetCredentialsExpire(boolean allowSetCredentialsExpire)
|
||||
{
|
||||
this.allowSetCredentialsExpire = allowSetCredentialsExpire;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowSetCredentialsExpiryDate(boolean allowSetCredentialsExpiryDate)
|
||||
{
|
||||
this.allowSetCredentialsExpiryDate = allowSetCredentialsExpiryDate;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowSetEnabled(boolean allowSetEnabled)
|
||||
{
|
||||
this.allowSetEnabled = allowSetEnabled;
|
||||
}
|
||||
|
||||
@Managed(category="Security")
|
||||
public void setAllowUpdateUser(boolean allowUpdateUser)
|
||||
{
|
||||
this.allowUpdateUser = allowUpdateUser;
|
||||
|
Reference in New Issue
Block a user