Retains all Cache objects maintained by this cache manager: keep this cache manager maintains a cache of all objects
Destroyable can destroy the
retains maintained
bundle bundle
assembly assembly
combine combine
assembly assembly, set
aggregate polymerization
relativePath relative path
tutorial Tutorial
Comprehensive integration
Authenticated Certified
jndi naming directory services (Java Naming and Directory Interface)
employee employees, industry employees
stack Overflow stack is removed
secure safe
set Credentials Matcher matcher disposed credential
Cipher Password
Advisor Consultant
Dialect dialect
Denied refused
assert Credentials Match maintain credentials match
discriminator to identify those
senior-level
junior young
comment Generator annotation generator
case, the instance
android studio studio Andrews
stash storage, hide
Subversion subversion, sabotage
Perforce must, must
Bazaar market, market
checkins over time, over time attendance
--------------
Four cornerstones of security: authentication, authorization, session management and enterprise encryption.
1. Authorized: whether there are areas of user authorization policy: coordination in the field to determine the conditions authentication attempt succeeded or failed. 2. Permissions: the user can do something 3. Description session management: Creating and Managing User Session lifecycle, SessionDAO: executes the session on behalf of persistence (CRUD) operations Session Manager - This allows any data storage insert a session management infrastructure. 4. cache management: no direct access to the database, and fast. 5. Cryptography: Cryptography simplified 6. art: to act as a bridge between applications and secure data - or connectors, similar to the data source.
What made LW:
Crypto Cryptography: Cryptography is a natural complement to enterprise security framework. Crypo Shiro package includes easy-to-use and understand the password hash and different codecs achieve representation.
What made lw:
simplify password encryption and decryption
What made LW:
subject: whatever the current software interacting
even made LW:
securityManager behind completing all the subject security operations
even made LW:
Realm can be connected to track many security data sources, is essentially a specific secure the DAO, it encapsulates details connected data sources, specify at least shiro when configuring a Realm for authentication and authorization
even making LW:
Authenticator (Authenticator at strategy authentication policies) authenticator: when a user login authentication knows how they relate to one or more storage Realms user information obtained from these data is used to verify data Realms subject information, to ensure that the subject is really the person they say. (Authenticator Strategy) authentication policies): If the Realm is configured with multiple authentication policy will be coordination in the field to determine the authentication attempt success or failure conditions, such as if a successful areas but in other areas the loss attempt is successful? All areas must win out? only one?
What made lw:
Permissions: Responsible for co-ordinating role, permission, you know what that user can operate.
What made LW:
Autorizer
even making LW:
SessionManager session management: security framework unique features: session management know to create and manage user session life cycle, provides a powerful user experience sessions in all environments.
What made lw:
allow any data source insisted the meeting that continued operation is similar to
what made lw:
Session management includes SessionDAO
even made lw:
SessionDao: Session persistence dao perform session management operation crud represented session, which allows the insertion of any data storage session management infrastructure.
What made LW:
CacheManager L cache management
even made LW:
CacheManager cache management: Create and manage Cache Shiro other components life cycle instance. Since many Shiro can access back-end data sources for authentication, authorization and session management, so the cache has been the leading architectural features of the framework can improve performance when using these data sources.