Invention Grant
- Patent Title: System and method for merging security constraints when using security annotations
- Patent Title (中): 使用安全注解时合并安全约束的系统和方法
-
Application No.: US13162744Application Date: 2011-06-17
-
Publication No.: US08645679B2Publication Date: 2014-02-04
- Inventor: Elisa Ferracane , Paul William Bennett , William J. O'Donnell , Ajay Reddy Karkala , Ut Van Le , Michael Craig Thompson , Maxim Avery Moldenhauer
- Applicant: Elisa Ferracane , Paul William Bennett , William J. O'Donnell , Ajay Reddy Karkala , Ut Van Le , Michael Craig Thompson , Maxim Avery Moldenhauer
- Applicant Address: US NY Armonk
- Assignee: International Business Machines Corporation
- Current Assignee: International Business Machines Corporation
- Current Assignee Address: US NY Armonk
- Agent Jeffrey S. LaBaw; David H. Judson
- Main IPC: H04L29/06
- IPC: H04L29/06

Abstract:
A method is described for merging security constraints associated with an application when using security annotations. The application comprises one or more servlets, such as a Java servlet. During application deployment, a list of role names is generated by merging static security constraints, for example, identified in a deployment descriptor, and in a static security annotation that defines a list containing the names of authorized roles for a servlet. Later, during application runtime in an application server, security constraints are retrieved from a plurality of sources, including both dynamic and static security annotations. Using the list of role names and the security constraints retrieved, a set of merged security constraints having a defined and proper order of precedence is generated. In particular, preferably one or more dynamic security annotations are first merged with one or more static security annotations to generate a set of runtime constraints. The security constraints from the deployment descriptor are then merged with the set of runtime constraints and the list of roles to generate the set of merged security constraints. These merged security constraints are then applied to process a request being handled by the application server.
Public/Granted literature
- US20120324528A1 System and method for merging security constraints when using security annotations Public/Granted day:2012-12-20
Information query