blob: 8027a740a3af1e22737fc6080769b3ef3f3de715 [file] [log] [blame]
<html>
<body>
Core interfaces and exceptions supporting Authorization (access control).
<p>JSecurity abbreviates the word 'AuthoriZation' as <tt>authz</tt> to distinguish it seperately from
'AuthentiCation', abbreviated as <tt>authc</tt>.</p>
<p>The primary interface of interest, which is the core of JSecurity authorization functionality,
is the <tt>Authorizer</tt>. This interface handles all aspects of principal-related security and is
the facade to all other JSecurity authorization components.</p>
<p>JSecurity has the ability to authorize subjects (a.k.a. users) without being intrusive to
the application's domain model. Most applications will utilize the concepts of
<tt>group</tt>s, <tt>role</tt>s, and <tt>permission</tt>s, but JSecurity tries to be
as non-invasive as possible doesn't require any such interfaces (although a Permission interface
is made available for fine-grained access control policies if you want to use
JSecurity's permission support out-of-the-box).</p>
<p>Although
it is possible for applications to implement this and other interfaces directly, it is not
recommended. JSecurity already has base implementations in the
<tt>org.jsecurity.authz.support</tt> package which
should be suitable for 99% of deployments.
Most applications should be able to use these
existing components via configuration only and be up and running very quickly. See the
API or the JSecurity.org website quick-start for how to accomplish this
instead of writing an implementation from scratch.</p>
<p>Finally, as is the case with most all of JSecurity interfaces and components, they can be used
programmatically, but it is highly recommended to use the JSecurity JDK 1.5 annotations and/or
configuration to reduce or eliminate such effort.</p>
</body>
</html>