Connecting to the Central Repository
Group items matching
in title, tags, annotations or url
3More
Connecting to the Central Repository - Documentation - Process and Tools - Confluence - 0 views
8More
Spring Security - Features - 0 views
-
Domain object instance security: In many applications it's desirable to define Access Control Lists (ACLs) for individual domain object instances. We provide a comprehensive ACL package with features including integer bit masking, permission inheritance (including blocking), an optimized JDBC-backed ACL repository, caching and a pluggable, interface-driven design.
-
OpenID Support: the web's emerging single sign-on standard (supported by Google, IBM, Sun, Yahoo and others) is also supported in Spring Security
-
Easy integration with existing databases: Our implementations have been designed to make it easy to use your existing authentication schema and data (without modification). Of course, you can also provide your own Data Access Object if you wish. Password encoding: Of course, passwords in your authentication repository need not be in plain text. We support both SHA and MD5 encoding, and also pluggable "salt" providers to maximise password security.
- ...5 more annotations...
-
Caching: Spring Security optionally integrates with Spring's Ehcache factory. This flexibility means your database (or other authentication repository) is not repeatedly queried for authentication information when using Spring Security with stateless applications.
-
Run-as replacement: The system fully supports temporarily replacing the authenticated principal for the duration of the web request or bean invocation. This enables you to build public-facing object tiers with different security configurations than your backend objects.
-
Tag library support: Your JSP files can use our taglib to ensure that protected content like links and messages are only displayed to users holding the appropriate granted authorities. The taglib also fully integrates with Spring Security's ACL services, and obtaining extra information about the logged-in principal.
-
User Provisioning APIs: Support for groups, hierarchical roles and a user management API, which all combine to reduce development time and significantly improve system administration.
-
Enterprise-wide single sign on using CAS 3: Spring Security integrates with JA-SIG's open source Central Authentication Service (CAS)
4More
Maven Getting Started - Developers | JBoss Community - 0 views
Sonatype Nexus Professional - 0 views
2More
Properties - 0 views
-
Subversion administrators commonly ask if it is possible to configure, on the server side, a set of property definitions which all connecting clients will automatically consider when operating on working copies checked out from that server. Unfortunately, Subversion doesn't offer this feature. Administrators can use hook scripts to validate that the properties added to and modified on files and directories match the administrator's preferred policies, rejecting commits which are non-compliant in this fashion. (See the section called “Implementing Repository Hooks” for more about hook scripts.) But there's no way to automatically dictate those preferences to Subversion clients beforehand.
22More
shared by kuni katsuya on 12 Dec 12
- No Cached
Dependency injection discourages object-oriented programming? @ Blog of Adam Warski - 0 views
www.warski.org/...es-object-oriented-programming
java javaee6 CDI CdiDependencyInjection OO Object-Oriented procedural DI DependencyInjection

-
if you’re using DI, and you have an X entity, do you have an XService or XManager with lots of method where X is the first argument?
-
previous way is more procedural
- ...12 more annotations...
-
service/manager is a set of procedures you can run, where the execution takes a product and a customer as arguments
-
encourages the ProductService approach
-
well, dependency injection, but moreover, the soa approach to service design tends to force otherwise intelligent software engineers into doing procedural design the services just end up being bags of method calls that implement any type of behavior, with the domain objects or entity beans being reduced to mere data structures with little responsibility or behavior beyond persistence. (which, in this anti-pattern, is typically mostly provided by the repository or dao class! ie. domain object crud)
-
-
it’s just easier
-
many benefits
-
it’s not for small projects
-
problems with DI frameworks:
8More
Quick Start · SpringSource/spring-social Wiki - 0 views
32More
Getting Started · UnquietCode/Flapi Wiki - 0 views
16More
GraphicsMagick FAQ - 0 views
- ...13 more annotations...
-
GraphicsMagick has been significantly updated to use multiple CPU cores to speed up the image processing
Java Web Framework Sweet Spots - 0 views
8More
Services, practices & tools that should exist in any software development house, part 1... - 1 views
22More
Enterprise Architect - Product Demonstrations - 0 views
-
Part 4 Configure & Connect Configuring Enterprise Architect and connecting to your Version Control system.
- ...19 more annotations...
-
Baseline Diagram Comparison Conduct a visual diagram comparison between your current diagram and a previous baseline .
-
Personal Information Window See how the Personal Information Window in Enterprise Architect can help you organize your daily tasks and workflow.
-
Working Sets As you perform work on your model, you open various windows, diagrams and views. Working Sets allow you to return to these same views in a later work session.
-
Business Rules A car rental system is used to illustrate how to generate executable business rules using Enterprise Architect.
-
Menu Customization Quickly and easily suppress individual menu items or entire categories of commands to create custom menu layouts.
-
Floating and Dockable Windows Save the position and layout of Floating and Dockable Windows using a Working Set in the Personal Information Window.
-
Build and Debug a Java Application Set up Enterprise Architect to build and debug a Java Application, using a VEA sample project.
-
Sequence Diagrams Learn how to create a simple Sequence diagram. The video also illustrates how to bring your Sequence diagram to life using model simulation.
-
HTML Report Generation This brief introduction illustrates how to automatically generate a HTML Report using Enterprise Architect.
-
Basic Use Case Demonstration A guide to constructing a Use Case model in under 30 seconds, including use cases, notes and issues.
-
Traceability within Enterprise Architect This video examines Traceability and discusses how to use Enterprise Architect to conduct an Impact Analysis.
-
Requirements Reporting A brief overview of requirements reporting in Enterprise Architect. Topics include document generation in web and RTF formats, report customization and virtual documents, including Model and Master documents.
-
Requirements Traceability An examination of requirements traceability in Enterprise Architect. Topics include traceability views, tracing to external artifacts, conducting an impact analysis, viewing the Relationship Matrix and using Enterprise Architect's Auditing capabilities.
-
Requirements Modeling A brief overview of requirements modeling in Enterprise Architect. Topics include requirements capture and definition, custom properties, tabular editing, auto-naming and screen prototypes.
-
Installing EA An introductory walk through and discussion of Enterprise Architect in the Software Development Lifecycle.
-
Enterprise Architect 7.5 Overview An overview of Enterprise Architect features released with version 7.5.
-
Introduction to Enterprise Architect An introductory walk through and discussion of Enterprise Architect in the Software Development Lifecycle.
-
Brief Overview The 10 minute guide to Enterprise Architect, from Requirements Management and Business Process Modeling to MDA and Code Engineering.
3More
JdbcRealm (Apache Shiro :: Core 1.1.0 API) - 0 views
-
subclassed and the appropriate methods overridden. (usually doGetAuthenticationInfo(org.apache.shiro.authc.AuthenticationToken), getRoleNamesForUser(java.sql.Connection,String), and/or getPermissions(java.sql.Connection,String,java.util.Collection)
4More
shared by kuni katsuya on 03 Sep 12
- No Cached
RolePermissionResolver (Apache Shiro :: Core 1.1.0 API) - 0 views
127.0.0.1/...RolePermissionResolver.html
security ApacheShiro Role Permission RolePermissionResolver

6More
AuthorizingRealm (Apache Shiro :: Core 1.1.0 API) - 0 views
-
An AuthorizingRealm extends the AuthenticatingRealm's capabilities by adding Authorization (access control) support
-
perform all role and permission checks automatically (and subclasses do not have to write this logic) as long as the getAuthorizationInfo(org.apache.shiro.subject.PrincipalCollection) method returns an AuthorizationInfo
- ...3 more annotations...
-
Returns an account's authorization-specific information for the specified principals, or null if no account could be found
10More
shared by kuni katsuya on 03 Sep 12
- No Cached
Realm (Apache Shiro :: Core 1.1.0 API) - 0 views
127.0.0.1/...Realm.html
security ApacheShiro Realm authentication authorization user Role Permission

- ...7 more annotations...
-
A Realm is a security component that can access application-specific security entities such as users, roles, and permissions to determine authentication and authorization operations
-
If for some reason you don't want your Realm implementation to perform authentication duties, you should override the supports(org.apache.shiro.authc.AuthenticationToken) method to always return false
-
Most users will not implement the Realm interface directly, but will extend one of the subclasses, AuthenticatingRealm or AuthorizingRealm, greatly reducing the effort requird to implement a Realm from scratch