blob: 5d9cf1e1de006867ad549413a6bca333f096735b [file] [log] [blame]
~ Licensed to the Apache Software Foundation (ASF) under one
~ or more contributor license agreements. See the NOTICE file
~ distributed with this work for additional information
~ regarding copyright ownership. The ASF licenses this file
~ to you under the Apache License, Version 2.0 (the
~ "License"); you may not use this file except in compliance
~ with the License. You may obtain a copy of the License at
~ Unless required by applicable law or agreed to in writing,
~ software distributed under the License is distributed on an
~ KIND, either express or implied. See the License for the
~ specific language governing permissions and limitations
~ under the License.
Securing a software application is a task that is almost always a necessity, but isn't
something that we like to worry about very often. We're more focused on programming business logic,
deadlines, performance, and many other things that are more directly related to things clients
can see. Application security is often an afterthought and something that we do when we
<quote>get around to it</quote>.
While application security is usually a necessity, it would be nice if we could implement it whenever
we want, and without it being too difficult. Actually, it
be difficult.
In fact, it
be downright easy. It should also be as
transparent and unintrusive as possible, so you don't have to change a lot of code to secure what you want.
And above all, it should be extremely easy to understand, so when you do actually have to look at security
code, it just makes sense.
JSecurity is a Java security framework that attempts to achieve these goals. The framework tries to
give as much power and flexibility as possible, while still being
easy to understand and easy to use. It tries to be the most comprehensive and feature-rich security
framework in the Java world so that you have everything you need at your fingertips.
This document is the official refrence manual for the JSecurity framework, and it aims to give you the
most complete documentation on JSecurity and all of its features. It is
very much a work-in-progress, and we welcome suggestions and recommendations. If you have any,
we'd very much appreciate your feedback on our forums at
<ulink url=""></ulink>
mailing lists at<ulink url=""></ulink>.
Before continuing on, we'd like to give credit where it is due for the format of this
book. We sincerely appreciate all the work that Christian Bauer from the
<ulink url="">Hibernate</ulink>
team and
Juergen Hoeller of the
<ulink url="">Spring</ulink>
team did in ensuring this
document could be created in PDF and HTML formats. Without their efforts, it would have been an agnoizing
task for us to do ourselves.
Thank you!
So, without further adieu, let's move on to the documentation. Feel
free knowing you can incorporate JSecurity's rich features quickly and easily now, or perhaps maybe
later when you<quote>get around to it</quote>.