June No. 7 shiro

Retains all Cache objects maintained by this cache manager: keep this cache manager maintains a cache of all objects

Destroyable can destroy the

retains maintained

bundle bundle

assembly assembly

combine combine

assembly assembly, set

aggregate polymerization

relativePath relative path

tutorial Tutorial

Comprehensive integration

Authenticated Certified

jndi naming directory services (Java Naming and Directory Interface)

employee employees, industry employees

stack Overflow stack is removed

secure safe

set Credentials Matcher matcher disposed credential

Cipher Password

Advisor Consultant

Dialect dialect

Denied refused

assert Credentials Match maintain credentials match

discriminator to identify those

senior-level

junior young

comment Generator annotation generator

case, the instance

android studio studio Andrews

stash storage, hide

Subversion subversion, sabotage

Perforce must, must

Bazaar market, market

checkins over time, over time attendance

 

 

--------------

Four cornerstones of security: authentication, authorization, session management and enterprise encryption.

1. Authorized: whether there are areas of user authorization policy: coordination in the field to determine the conditions authentication attempt succeeded or failed. 2. Permissions: the user can do something 3. Description session management: Creating and Managing User Session lifecycle, SessionDAO: executes the session on behalf of persistence (CRUD) operations Session Manager - This allows any data storage insert a session management infrastructure. 4. cache management: no direct access to the database, and fast. 5. Cryptography: Cryptography simplified 6. art: to act as a bridge between applications and secure data - or connectors, similar to the data source.

 

What made LW:
Crypto Cryptography: Cryptography is a natural complement to enterprise security framework. Crypo Shiro package includes easy-to-use and understand the password hash and different codecs achieve representation.

What made lw:
simplify password encryption and decryption

 

What made LW:
subject: whatever the current software interacting

even made LW:
securityManager behind completing all the subject security operations

even made LW:
Realm can be connected to track many security data sources, is essentially a specific secure the DAO, it encapsulates details connected data sources, specify at least shiro when configuring a Realm for authentication and authorization

even making LW:
Authenticator (Authenticator at strategy authentication policies) authenticator: when a user login authentication knows how they relate to one or more storage Realms user information obtained from these data is used to verify data Realms subject information, to ensure that the subject is really the person they say. (Authenticator Strategy) authentication policies): If the Realm is configured with multiple authentication policy will be coordination in the field to determine the authentication attempt success or failure conditions, such as if a successful areas but in other areas the loss attempt is successful? All areas must win out? only one?

What made lw:
Permissions: Responsible for co-ordinating role, permission, you know what that user can operate.

What made LW:
Autorizer

even making LW:
SessionManager session management: security framework unique features: session management know to create and manage user session life cycle, provides a powerful user experience sessions in all environments.

What made lw:
allow any data source insisted the meeting that continued operation is similar to

what made lw:
Session management includes SessionDAO

even made lw:
SessionDao: Session persistence dao perform session management operation crud represented session, which allows the insertion of any data storage session management infrastructure.

What made LW:
CacheManager L cache management

even made LW:
CacheManager cache management: Create and manage Cache Shiro other components life cycle instance. Since many Shiro can access back-end data sources for authentication, authorization and session management, so the cache has been the leading architectural features of the framework can improve performance when using these data sources.

 

Guess you like

Origin www.cnblogs.com/wym591273/p/10991847.html