Deploying your application
Group items matching
in title, tags, annotations or urlUML as a Data Modeling Notation, Part 4 - 0 views
UML as a Data Modeling Notation, Part 3 - 0 views
UML as a Data Modeling Notation, Part 2 - 0 views
Amazon.com: Data Model Patterns: Conventions of Thought (9780932633293): David C. Hay: ... - 0 views
UML as a Data Modeling Notation, Part 1 - 0 views
18More
JBoss AS7 Deployment Plugin - Deploy/Undeploy Examples - 0 views
-
<plugin> <groupId>org.jboss.as.plugins</groupId> <artifactId>jboss-as-maven-plugin</artifactId> <version>7.1.1.Final</version> </plugin>
- ...15 more annotations...
-
<configuration> <groupId>postgresql</groupId> <artifactId>postgresql</artifactId> <name>postgresql.jar</name> </configuration>
-
<domain> <server-groups> <server-group>main-server-group</server-group> </server-groups> </domain>
3More
Dependency Injection in Java EE 6 (Part 6) - 0 views
-
one of the most important value propositions for frameworks like Spring has been the ability to easily extend the framework or integrate third-party solutions
-
SPI allows you to register your own beans, custom scopes, stereotypes, interceptors and decorators with CDI even if is it not included in the automatic scanning process (such as perhaps registering Spring beans as CDI beans), programmatically looking up CDI beans and injecting them into your own objects (such as injecting CDI beans into Spring beans) and adding/overriding annotation-metadata from other sources (such as from a database or property file)
-
SPI can be segmented into three parts. Interfaces like Bean, Interceptor and Decorator model container meta-data (there are a few other meta-data interfaces such as ObserverMethod, Producer, InjectionTarget, InjectionPoint, AnnotatedType, AnnotatedMethod, etc). Each meta-data object encapsulates everything that the CDI container needs to know about the meta-data type
15More
Application Security With Apache Shiro - 0 views
- ...12 more annotations...
-
'Subject' can mean a human being, but also a 3rd party process, daemon account, or anything similar. It simply means 'the thing that is currently interacting with the software'
-
Realm acts as the ‘bridge’ or ‘connector’ between Shiro and your application’s security data. That is, when it comes time to actually interact with security-related data like user accounts to perform authentication (login) and authorization (access control), Shiro looks up many of these things from one or more Realms configured for an application.
-
Shiro provides out-of-the-box Realms to connect to a number of security data sources (aka directories) such as LDAP, relational databases (JDBC), text configuration sources like INI and properties files, and more
-
A permission is a raw statement of functionality, for example ‘open a door’, ‘create a blog entry’, ‘delete the ‘jsmith’ user’, etc. By having permissions reflect your application’s raw functionality, you only need to change permission checks when you change your application’s functionality. In turn, you can assign permissions to roles or to users as necessary at runtime.
41More
Security Module Drafts - Apache DeltaSpike - Apache Software Foundation - 0 views
-
Impersonalization
-
authenticates “as a user” or access application imitating his identity - without knowing his password
- ...36 more annotations...
-
assign permissions to individual objects within the application’s business domain
-
Events LoggedInEvent LoginFailedEvent AlreadyLoggedInEvent PreLoggedOutEvent PostLoggedOutEvent PreAuthenticateEvent PostAuthenticateEvent
-
control which elements of the user interface are displayed to the user based on their assigned permissions
11More
Interview of GraniteDS founders | RIAgora - 0 views
- ...8 more annotations...
-
validation framework is a specific adaptation of the JSR-303 (Bean Validation) specification to Flex: like its Java counterpart, it relies on validation annotations placed on bean properties and provides an engine API that lets you validate your forms without writing by hand a specific validator for each of your input fields
-
code generation tools provided by GraniteDS so that when you write your Java entity bean with validation annotations, they are automatically replicated in your ActionScript3 beans
-
problem with LCDS is mainly that it promotes a strict “client / server” architecture, with – roughly speaking – a heavy Flex client application connected to a server almost reduced to a database frontend
-
big majority of these organizations use BlazeDS, a free and open-source subset of LCDS
-
need more advanced mechanisms than just Remoting start looking for open-source libraries to enable deeper integrations with the Java business layer, and GraniteDS is for sure the most popular project
53More
Session Management Cheat Sheet - OWASP - 0 views
- ...50 more annotations...
-
meaning and business or application logic associated to the session ID must be stored on the server side
-
create cryptographically strong session IDs through the usage of cryptographic hash functions such as SHA1 (160 bits).
-
defines the exchange mechanism that will be used between the user and the web application to share and continuously exchange the session ID
-
This is one of the reasons why cookies (RFCs 2109 & 2965 & 6265 [1]) are one of the most extensively used session ID exchange mechanisms, offering advanced capabilities not available in other methods
-
should not mix encrypted and unencrypted contents (HTML pages, images, CSS, Javascript files, etc) on the same host (or even domain - see the “domain” cookie attribute)
-
secure.example.com over HTTPS (encrypted) for the private and sensitive contents (where sessions exist)
-
instructs web browsers not to allow scripts (e.g. JavaScript or VBscript) an ability to access the cookies via the DOM document.cookie object
-
instructs web browsers to only send the cookie to the specified directory or subdirectories (or paths or resources) within the web application
-
vulnerabilities in www.example.com might allow an attacker to get access to the session IDs from secure.example.com
-
use non-persistent cookies for session management purposes, so that the session ID does not remain on the web client cache for long periods of time, from where an attacker can obtain it.
48More
Logging Cheat Sheet - OWASP - 0 views
-
Legal and other opt-ins
-
Data changes
- ...35 more annotations...
-
Application identifier
-
Application address
-
User identity
-
Description
-
Action
-
Object
-
Result status
-
Reason
Apache OpenJPA -- Index - 0 views
16More
MySQL Error Number 1005 Can't create table '.mydb#sql-328_45.frm' (errno: 150) | VerySi... - 0 views
- ...12 more annotations...
-
One of the key field that you are trying to reference does not have an index and/or is not a primary key
-
Make sure that the Charset and Collate options are the same both at the table level as well as individual field level for the key columns
-
You have a syntax error in your ALTER statement or you have mistyped one of the field names in the relationship
-
max length of 64 chars
4More