OracleAuthorizationManager
Les implémentations de AuthorizationManager sont dédiées au développeur de webapp. Cette implémentation de AuthorizationManager permet une méthode d'autorisation basée sur la base de données Oracle.1. OracleAuthorizationManager paramètres
La DTD (jGuardPrincipalsPermissions_x.xx.dtd), doit être placée dans le même répertoire. Ces paramètres doivent être placés dans la liste de paramètres de l'AccessFilter situé dans le fichier web.xml.-
permissionManager
valeurs
net.sf.jguard.authorization.OracleAuthorizationManager
description
Il configure l'utilisation de l'implémentation oracle du AuthorizationManager.
exemple
..... <init-param> <param-name>permissionManager</param-name> <param-value>net.sf.jguard.authorization.OracleAuthorizationManager</param-value> <description>class which handle to collect permissionsCollection</description> </init-param> .....
-
authorizationDriver
valeurs
oracle.jdbc.driver.OracleDriver
description
Il indique l'implementation oracle de l'interface java.sql.Driver.
exemple
..... <init-param> <param-name>authorizationDriver</param-name> <param-value>oracle.jdbc.driver.OracleDriver</param-value> <description>jdbc driver for authorizations</description> </init-param> ....
-
authorizationUrl
valeurs
any JDBC compliant url
description
Ce paramètre permet d'établir une connexion à la base de données.
exemple
..... <init-param> <param-name>authorizationUrl</param-name> <param-value>jdbc:oracle:thin:@sweetHome.net:1521:dbName</param-value> <description>jdbc url for authorizations</description> </init-param> ....
-
authorizationLogin
valeurs
toute valeur
description
this paramètre est l'identifiant utilisé pour établir la connexion.
example
..... <init-param> <param-name>authorizationLogin</param-name> <param-value>system</param-value> <description>login to establish authorizations connection</description> </init-param> ....
-
authorizationPassword
valeurs
toute valeur
description
Ce paramètre est le mot de passe the utilisé pour établir la connexion.
exemple
..... <init-param> <param-name>authorizationPassword</param-name> <param-value>manager</param-value> <description>password to establish authorizations connection</description> </init-param> ....
-
debug
valeurs
true or false
description
permet l'affichae d'informations de debug avec la valeur true.
exemple
..... <init-param> <param-name>debug</param-name> <param-value>false</param-value> <description>enable debug with true to trace authorization settings</description> </init-param> ....
2. script d'installation SQL
alter table jg_role_permission drop constraint fk_permission_role; alter table jg_role_permission drop constraint fk_role_permission; alter table jg_urlquery drop constraint fk_permission_parameter; alter table jg_permission drop constraint fk_permission_domain; drop table jg_role_domain cascade constraints; drop table jg_role_permission cascade constraints; drop table jg_urlquery cascade constraints; drop table jg_app_role cascade constraints; drop table jg_permission cascade constraints; drop table jg_domain cascade constraints; drop sequence jg_urlquery_seq; drop sequence jg_app_role_seq; drop sequence jg_domain_seq; drop sequence jg_permission_seq; create table jg_role_domain ( domain_name varchar2(255)not null, role_name varchar2(255)not null, primary key (role_name, domain_name) ); create table jg_role_permission ( permission_name varchar2(255) not null, role_name varchar2(255) not null, primary key (role_name, permission_name) ); create table jg_urlquery ( urlquery_id number(19,0) not null, parameter varchar2(255), value varchar2(255), permission_name varchar2(255), primary key (urlquery_id) ); -- role declared for the application create table jg_app_role ( name varchar2(255) not null, primary key (name) ); create table jg_domain( name varchar2(255) not null, primary key(name) ); create table jg_permission ( name varchar2(255) not null, uri varchar2(255), description varchar2(255), scheme varchar2(5), domain_name varchar2(255), primary key (name) ); -- add constraints alter table jg_role_permission add constraint fk_permission_role foreign key (role_name) references jg_app_role; alter table jg_role_permission add constraint fk_role_permission foreign key (permission_name) references jg_permission; alter table jg_role_domain add constraint fk_domain_role foreign key (role_name) references jg_app_role; alter table jg_role_domain add constraint fk_role_domain foreign key (domain_name) references jg_domain; alter table jg_urlquery add constraint fk_permission_parameter foreign key (permission_name) references jg_permission; alter table jg_permission add constraint fk_permission_domain foreign key (domain_name) references jg_domain; --create sequences create sequence jg_urlquery_seq; create sequence jg_app_role_seq; create sequence jg_permission_seq; create sequence jg_domain_seq;