...
- Shiro Authentication:
- Using a mapping of roles to permissions stored in the local
shiro.ini
configuration file.
- Using a mapping of roles to permissions stored in the local
- LDAP Authentication:
- Using a configurable LDAP query that determines membership of an Active Directory group. The Active Directory group is the then mapped onto one or more Shiro roles. This role is or these roles are then mapped onto a set of permissions using information stored in the local
shiro.ini
configuration file.
- Using a configurable LDAP query that determines membership of an Active Directory group. The Active Directory group is the then mapped onto one or more Shiro roles. This role is or these roles are then mapped onto a set of permissions using information stored in the local
- Database Authentication:
- Using a Hibernate query to check the user's role(s) against a table of roles and permissions stored in the same database as used for authentication.
...