jsr375-experts@javaee-security-spec.java.net

[jsr375-experts] Re: Top Down vs. Bottom Up

From: Darran Lofthouse <darran.lofthouse_at_redhat.com>
Date: Mon, 20 Apr 2015 14:17:09 +0100

On 14/04/15 07:17, Adam Bien wrote:
> Hi EGs,
>
> as an application developer I'm particularly interested in the overall experience for the most common use cases:
>
> 1. login with user name and password

IMO an application developer should be interested in knowing that their
application can be secured but not necessarily the how.

> 2. token authentication with JAX-RS
> 3. annotation based and runtime authorization (interceptors, permissions etc.)
> 4. enhancement of Principal with application specific payload
> 5. logout
> 6. user management
>
> I would like to create a simplistic Java EE application(s) (max 5 classes) and try to implement the use cases above with minimal required code.
> If necessary with proprietary APIs, which hopefully are going to be replaced by standard spec as we progress.
> We could use this application for further discussion and further simplification and usability enhancement,
>
> what do you think?
>
> cheers,
>
> adam
>