| [66] | 1 | <html><head><META http-equiv="Content-Type" content="text/html; charset=iso-8859-1"><title>Apache Tomcat Configuration Reference - The Realm Component</title><meta value="Craig R. McClanahan" name="author"><meta value="craigmcc@apache.org" name="email"></head><body vlink="#525D76" alink="#525D76" link="#525D76" text="#000000" bgcolor="#ffffff"><table cellspacing="0" width="100%" border="0"><!--PAGE HEADER--><tr><td><!--PROJECT LOGO--><a href="http://tomcat.apache.org/"><img border="0" alt=" | 
|---|
|  | 2 | The Apache Tomcat Servlet/JSP Container | 
|---|
|  | 3 | " align="right" src="../../images/tomcat.gif"></a></td><td><font face="arial,helvetica,sanserif"><h1>Apache Tomcat 6.0</h1></font></td><td><!--APACHE LOGO--><a href="http://www.apache.org/"><img border="0" alt="Apache Logo" align="right" src="../../images/asf-logo.gif"></a></td></tr></table><table cellspacing="4" width="100%" border="0"><!--HEADER SEPARATOR--><tr><td colspan="2"><hr size="1" noshade></td></tr><tr><!--RIGHT SIDE MAIN BODY--><td align="left" valign="top" width="80%"><table cellspacing="4" width="100%" border="0"><tr><td valign="top" align="left"><h1>Apache Tomcat Configuration Reference</h1><h2>The Realm Component</h2></td><td nowrap="true" valign="top" align="right"><img border="0" hspace="0" vspace="0" height="1" width="1" src="../../images/void.gif"></td></tr></table><table cellpadding="2" cellspacing="0" border="0"><tr><td bgcolor="#525D76"><font face="arial,helvetica.sanserif" color="#ffffff"><a name="Introduction"><strong>Introduction</strong></a></font></td></tr><tr><td><blockquote> | 
|---|
|  | 4 |  | 
|---|
|  | 5 | <p>A <strong>Realm</strong> element represents a "database" of usernames, | 
|---|
|  | 6 | passwords, and <em>roles</em> (similar to Unix <em>groups</em>) assigned | 
|---|
|  | 7 | to those users.  Different implementations of Realm allow Catalina to be | 
|---|
|  | 8 | integrated into environments where such authentication information is already | 
|---|
|  | 9 | being created and maintained, and then utilize that information to implement | 
|---|
|  | 10 | <em>Container Managed Security</em> as described in the Servlet | 
|---|
|  | 11 | Specification.</p> | 
|---|
|  | 12 |  | 
|---|
|  | 13 | <p>You may nest a Realm inside any Catalina container | 
|---|
|  | 14 | <a href="engine.html">Engine</a>, <a href="host.html">Host</a>, or | 
|---|
|  | 15 | <a href="context.html">Context</a>).  In addition, Realms associated with | 
|---|
|  | 16 | an Engine or a Host are automatically inherited by lower-level | 
|---|
|  | 17 | containers, unless explicitly overridden.</p> | 
|---|
|  | 18 |  | 
|---|
|  | 19 | <p>For more in-depth information about container managed security in web | 
|---|
|  | 20 | applications, as well as more information on configuring and using the | 
|---|
|  | 21 | standard realm component implementations, please see the | 
|---|
|  | 22 | <a href="../../realm-howto.html">Container-Managed Security Guide</a>. | 
|---|
|  | 23 | </p> | 
|---|
|  | 24 |  | 
|---|
|  | 25 | <blockquote><em> | 
|---|
|  | 26 | <p>The description below uses the variable name $CATALINA_BASE to refer the | 
|---|
|  | 27 | base directory against which most relative paths are resolved. If you have | 
|---|
|  | 28 | not configured Tomcat 6 for multiple instances by setting a CATALINA_BASE | 
|---|
|  | 29 | directory, then $CATALINA_BASE will be set to the value of $CATALINA_HOME, | 
|---|
|  | 30 | the directory into which you have installed Tomcat 6.</p> | 
|---|
|  | 31 | </em></blockquote> | 
|---|
|  | 32 |  | 
|---|
|  | 33 | </blockquote></td></tr></table><table cellpadding="2" cellspacing="0" border="0"><tr><td bgcolor="#525D76"><font face="arial,helvetica.sanserif" color="#ffffff"><a name="Attributes"><strong>Attributes</strong></a></font></td></tr><tr><td><blockquote> | 
|---|
|  | 34 |  | 
|---|
|  | 35 | <table cellpadding="2" cellspacing="0" border="0"><tr><td bgcolor="#828DA6"><font face="arial,helvetica.sanserif" color="#ffffff"><a name="Common Attributes"><strong>Common Attributes</strong></a></font></td></tr><tr><td><blockquote> | 
|---|
|  | 36 |  | 
|---|
|  | 37 | <p>All implementations of <strong>Realm</strong> | 
|---|
|  | 38 | support the following attributes:</p> | 
|---|
|  | 39 |  | 
|---|
|  | 40 | <table cellpadding="5" border="1"><tr><th bgcolor="#023264" width="15%"><font color="#ffffff">Attribute</font></th><th bgcolor="#023264" width="85%"><font color="#ffffff">Description</font></th></tr><tr><td valign="center" align="left"><strong><code>className</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 41 | <p>Java class name of the implementation to use.  This class must | 
|---|
|  | 42 | implement the <code>org.apache.catalina.Realm</code> interface.</p> | 
|---|
|  | 43 | </td></tr></table> | 
|---|
|  | 44 |  | 
|---|
|  | 45 | </blockquote></td></tr></table> | 
|---|
|  | 46 |  | 
|---|
|  | 47 |  | 
|---|
|  | 48 | <table cellpadding="2" cellspacing="0" border="0"><tr><td bgcolor="#828DA6"><font face="arial,helvetica.sanserif" color="#ffffff"><a name="Standard Implementation"><strong>Standard Implementation</strong></a></font></td></tr><tr><td><blockquote> | 
|---|
|  | 49 |  | 
|---|
|  | 50 | <p>Unlike most Catalina components, there are several standard | 
|---|
|  | 51 | <strong>Realm</strong> implementations available.  As a result, | 
|---|
|  | 52 | the <code>className</code> attribute MUST be used to select the | 
|---|
|  | 53 | implementation you wish to use.</p> | 
|---|
|  | 54 |  | 
|---|
|  | 55 | <h3>JDBC Database Realm (org.apache.catalina.realm.JDBCRealm)</h3> | 
|---|
|  | 56 |  | 
|---|
|  | 57 | <p>The <strong>JDBC Database Realm</strong> connects Catalina to | 
|---|
|  | 58 | a relational database, accessed through an appropriate JDBC driver, | 
|---|
|  | 59 | to perform lookups of usernames, passwords, and their associated | 
|---|
|  | 60 | roles.  Because the lookup is done each time that it is required, | 
|---|
|  | 61 | changes to the database will be immediately reflected in the | 
|---|
|  | 62 | information used to authenticate new logins.</p> | 
|---|
|  | 63 |  | 
|---|
|  | 64 | <p>A rich set of additional attributes lets you configure the required | 
|---|
|  | 65 | connection to the underlying database, as well as the table and | 
|---|
|  | 66 | column names used to retrieve the required information:</p> | 
|---|
|  | 67 |  | 
|---|
|  | 68 | <table cellpadding="5" border="1"><tr><th bgcolor="#023264" width="15%"><font color="#ffffff">Attribute</font></th><th bgcolor="#023264" width="85%"><font color="#ffffff">Description</font></th></tr><tr><td valign="center" align="left"><strong><code>connectionName</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 69 | <p>The database username to use when establishing the JDBC | 
|---|
|  | 70 | connection.</p> | 
|---|
|  | 71 | </td></tr><tr><td valign="center" align="left"><strong><code>connectionPassword</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 72 | <p>The database password to use when establishing the JDBC | 
|---|
|  | 73 | connection.</p> | 
|---|
|  | 74 | </td></tr><tr><td valign="center" align="left"><strong><code>connectionURL</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 75 | <p>The connection URL to be passed to the JDBC driver when | 
|---|
|  | 76 | establishing a database connection.</p> | 
|---|
|  | 77 | </td></tr><tr><td valign="center" align="left"><code>digest</code></td><td valign="center" align="left"> | 
|---|
|  | 78 | <p>The name of the <code>MessageDigest</code> algorithm used | 
|---|
|  | 79 | to encode user passwords stored in the database.  If not specified, | 
|---|
|  | 80 | user passwords are assumed to be stored in clear-text.</p> | 
|---|
|  | 81 | </td></tr><tr><td valign="center" align="left"><code>digestEncoding</code></td><td valign="center" align="left"> | 
|---|
|  | 82 | <p>The charset for encoding digests.  If not specified, the platform | 
|---|
|  | 83 | default will be used.</p> | 
|---|
|  | 84 | </td></tr><tr><td valign="center" align="left"><strong><code>driverName</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 85 | <p>Fully qualified Java class name of the JDBC driver to be | 
|---|
|  | 86 | used to connect to the authentication database.</p> | 
|---|
|  | 87 | </td></tr><tr><td valign="center" align="left"><strong><code>roleNameCol</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 88 | <p>Name of the column, in the "user roles" table, which contains | 
|---|
|  | 89 | a role name assigned to the corresponding user.</p> | 
|---|
|  | 90 | </td></tr><tr><td valign="center" align="left"><strong><code>userCredCol</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 91 | <p>Name of the column, in the "users" table, which contains | 
|---|
|  | 92 | the user's credentials (i.e. password(.  If a value for the | 
|---|
|  | 93 | <code>digest</code> attribute is specified, this component | 
|---|
|  | 94 | will assume that the passwords have been encoded with the | 
|---|
|  | 95 | specified algorithm.  Otherwise, they will be assumed to be | 
|---|
|  | 96 | in clear text.</p> | 
|---|
|  | 97 | </td></tr><tr><td valign="center" align="left"><strong><code>userNameCol</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 98 | <p>Name of the column, in the "users" and "user roles" table, | 
|---|
|  | 99 | that contains the user's username.</p> | 
|---|
|  | 100 | </td></tr><tr><td valign="center" align="left"><strong><code>userRoleTable</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 101 | <p>Name of the "user roles" table, which must contain columns | 
|---|
|  | 102 | named by the <code>userNameCol</code> and <code>roleNameCol</code> | 
|---|
|  | 103 | attributes.</p> | 
|---|
|  | 104 | </td></tr><tr><td valign="center" align="left"><strong><code>userTable</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 105 | <p>Name of the "users" table, which must contain columns named | 
|---|
|  | 106 | by the <code>userNameCol</code> and <code>userCredCol</code> | 
|---|
|  | 107 | attributes.</p> | 
|---|
|  | 108 | </td></tr></table> | 
|---|
|  | 109 |  | 
|---|
|  | 110 | <p>See the <a href="../../realm-howto.html">Container-Managed Security Guide</a> for more | 
|---|
|  | 111 | information on setting up container managed security using the | 
|---|
|  | 112 | JDBC Database Realm component.</p> | 
|---|
|  | 113 |  | 
|---|
|  | 114 |  | 
|---|
|  | 115 | <h3> | 
|---|
|  | 116 | DataSource Database Realm (org.apache.catalina.realm.DataSourceRealm) | 
|---|
|  | 117 | </h3> | 
|---|
|  | 118 |  | 
|---|
|  | 119 | <p>The <strong>DataSource Database Realm</strong> connects Catalina to | 
|---|
|  | 120 | a relational database, accessed through a JNDI named JDBC DataSource | 
|---|
|  | 121 | to perform lookups of usernames, passwords, and their associated | 
|---|
|  | 122 | roles.  Because the lookup is done each time that it is required, | 
|---|
|  | 123 | changes to the database will be immediately reflected in the | 
|---|
|  | 124 | information used to authenticate new logins.</p> | 
|---|
|  | 125 |  | 
|---|
|  | 126 | <p>The JDBC Realm uses a single db connection. This requires that | 
|---|
|  | 127 | realm based authentication be synchronized, i.e. only one authentication | 
|---|
|  | 128 | can be done at a time. This could be a bottleneck for applications | 
|---|
|  | 129 | with high volumes of realm based authentications.</p> | 
|---|
|  | 130 |  | 
|---|
|  | 131 | <p>The DataSource Database Realm supports simultaneous realm based | 
|---|
|  | 132 | authentications and allows the underlying JDBC DataSource to | 
|---|
|  | 133 | handle optimizations like database connection pooling.</p> | 
|---|
|  | 134 |  | 
|---|
|  | 135 | <p>A rich set of additional attributes lets you configure the name | 
|---|
|  | 136 | of the JNDI JDBC DataSource, as well as the table and | 
|---|
|  | 137 | column names used to retrieve the required information:</p> | 
|---|
|  | 138 |  | 
|---|
|  | 139 | <table cellpadding="5" border="1"><tr><th bgcolor="#023264" width="15%"><font color="#ffffff">Attribute</font></th><th bgcolor="#023264" width="85%"><font color="#ffffff">Description</font></th></tr><tr><td valign="center" align="left"><strong><code>dataSourceName</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 140 | <p>The name of the JNDI JDBC DataSource for this Realm.</p> | 
|---|
|  | 141 | </td></tr><tr><td valign="center" align="left"><code>digest</code></td><td valign="center" align="left"> | 
|---|
|  | 142 | <p>The name of the <code>MessageDigest</code> algorithm used | 
|---|
|  | 143 | to encode user passwords stored in the database.  If not specified, | 
|---|
|  | 144 | user passwords are assumed to be stored in clear-text.</p> | 
|---|
|  | 145 | </td></tr><tr><td valign="center" align="left"><code>localDataSource</code></td><td valign="center" align="left"> | 
|---|
|  | 146 | <p>When the realm is nested inside a Context element, this allows the | 
|---|
|  | 147 | realm to use a DataSource defined for the Context rather than a global | 
|---|
|  | 148 | DataSource.  If not specified, the default is <code>false</code>: use a | 
|---|
|  | 149 | global DataSource.</p> | 
|---|
|  | 150 | </td></tr><tr><td valign="center" align="left"><strong><code>roleNameCol</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 151 | <p>Name of the column, in the "user roles" table, which contains | 
|---|
|  | 152 | a role name assigned to the corresponding user.</p> | 
|---|
|  | 153 | </td></tr><tr><td valign="center" align="left"><strong><code>userCredCol</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 154 | <p>Name of the column, in the "users" table, which contains | 
|---|
|  | 155 | the user's credentials (i.e. password(.  If a value for the | 
|---|
|  | 156 | <code>digest</code> attribute is specified, this component | 
|---|
|  | 157 | will assume that the passwords have been encoded with the | 
|---|
|  | 158 | specified algorithm.  Otherwise, they will be assumed to be | 
|---|
|  | 159 | in clear text.</p> | 
|---|
|  | 160 | </td></tr><tr><td valign="center" align="left"><strong><code>userNameCol</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 161 | <p>Name of the column, in the "users" and "user roles" table, | 
|---|
|  | 162 | that contains the user's username.</p> | 
|---|
|  | 163 | </td></tr><tr><td valign="center" align="left"><strong><code>userRoleTable</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 164 | <p>Name of the "user roles" table, which must contain columns | 
|---|
|  | 165 | named by the <code>userNameCol</code> and <code>roleNameCol</code> | 
|---|
|  | 166 | attributes.</p> | 
|---|
|  | 167 | </td></tr><tr><td valign="center" align="left"><strong><code>userTable</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 168 | <p>Name of the "users" table, which must contain columns named | 
|---|
|  | 169 | by the <code>userNameCol</code> and <code>userCredCol</code> | 
|---|
|  | 170 | attributes.</p> | 
|---|
|  | 171 | </td></tr></table> | 
|---|
|  | 172 |  | 
|---|
|  | 173 | <p>See the <a href="../../realm-howto.html#DataSourceRealm"> | 
|---|
|  | 174 | DataSource Realm HOW-TO</a> for more information on setting up container | 
|---|
|  | 175 | managed security using the DataSource Database Realm component.</p> | 
|---|
|  | 176 |  | 
|---|
|  | 177 |  | 
|---|
|  | 178 | <h3>JNDI Directory Realm (org.apache.catalina.realm.JNDIRealm)</h3> | 
|---|
|  | 179 |  | 
|---|
|  | 180 |  | 
|---|
|  | 181 | <p>The <strong>JNDI Directory Realm</strong> connects Catalina to | 
|---|
|  | 182 | an LDAP Directory, accessed through an appropriate JNDI driver, | 
|---|
|  | 183 | that stores usernames, passwords, and their associated | 
|---|
|  | 184 | roles. Changes to the directory are immediately reflected in the | 
|---|
|  | 185 | information used to authenticate new logins.</p> | 
|---|
|  | 186 |  | 
|---|
|  | 187 |  | 
|---|
|  | 188 | <p>The directory realm supports a variety of approaches to using | 
|---|
|  | 189 | LDAP for authentication:</p> | 
|---|
|  | 190 |  | 
|---|
|  | 191 | <ul> | 
|---|
|  | 192 | <li>The realm can either use a pattern to determine the | 
|---|
|  | 193 | distinguished name (DN) of the user's directory entry, or search | 
|---|
|  | 194 | the directory to locate that entry. | 
|---|
|  | 195 | </li> | 
|---|
|  | 196 |  | 
|---|
|  | 197 | <li>The realm can authenticate the user either by binding to the | 
|---|
|  | 198 | directory with the DN of the user's entry and the password | 
|---|
|  | 199 | presented by the user, or by retrieving the password from the | 
|---|
|  | 200 | user's entry and performing a comparison locally. | 
|---|
|  | 201 | </li> | 
|---|
|  | 202 |  | 
|---|
|  | 203 | <li>Roles may be represented in the directory as explicit entries | 
|---|
|  | 204 | found by a directory search (e.g. group entries of which the user | 
|---|
|  | 205 | is a member), as the values of an attribute in the user's entry, | 
|---|
|  | 206 | or both. | 
|---|
|  | 207 | </li> | 
|---|
|  | 208 | </ul> | 
|---|
|  | 209 |  | 
|---|
|  | 210 | <p> A rich set of additional attributes lets you configure the | 
|---|
|  | 211 | required behaviour as well as the connection to the underlying | 
|---|
|  | 212 | directory and the element and attribute names used to retrieve | 
|---|
|  | 213 | information from the directory:</p> | 
|---|
|  | 214 |  | 
|---|
|  | 215 | <table cellpadding="5" border="1"><tr><th bgcolor="#023264" width="15%"><font color="#ffffff">Attribute</font></th><th bgcolor="#023264" width="85%"><font color="#ffffff">Description</font></th></tr><tr><td valign="center" align="left"><code>alternateURL</code></td><td valign="center" align="left"> | 
|---|
|  | 216 | <p>If a socket connection can not be made to the provider at | 
|---|
|  | 217 | the <code>connectionURL</code> an attempt will be made to use the | 
|---|
|  | 218 | <code>alternateURL</code>.</p> | 
|---|
|  | 219 | </td></tr><tr><td valign="center" align="left"><code>authentication</code></td><td valign="center" align="left"> | 
|---|
|  | 220 | <p>A string specifying the type of authentication to use. | 
|---|
|  | 221 | "none", "simple", "strong" or a provider specific definition | 
|---|
|  | 222 | can be used. If no value is given the providers default is used.</p> | 
|---|
|  | 223 | </td></tr><tr><td valign="center" align="left"><code>connectionName</code></td><td valign="center" align="left"> | 
|---|
|  | 224 | <p>The directory username to use when establishing a | 
|---|
|  | 225 | connection to the directory for LDAP search operations. If not | 
|---|
|  | 226 | specified an anonymous connection is made, which is often | 
|---|
|  | 227 | sufficient unless you specify the <code>userPassword</code> | 
|---|
|  | 228 | property.</p> | 
|---|
|  | 229 | </td></tr><tr><td valign="center" align="left"><code>connectionPassword</code></td><td valign="center" align="left"> | 
|---|
|  | 230 | <p>The directory password to use when establishing a | 
|---|
|  | 231 | connection to the directory for LDAP search operations. If not | 
|---|
|  | 232 | specified an anonymous connection is made, which is often | 
|---|
|  | 233 | sufficient unless you specify the <code>userPassword</code> | 
|---|
|  | 234 | property.</p> | 
|---|
|  | 235 | </td></tr><tr><td valign="center" align="left"><strong><code>connectionURL</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 236 | <p>The connection URL to be passed to the JNDI driver when | 
|---|
|  | 237 | establishing a connection to the directory.</p> | 
|---|
|  | 238 | </td></tr><tr><td valign="center" align="left"><code>contextFactory</code></td><td valign="center" align="left"> | 
|---|
|  | 239 | <p>Fully qualified Java class name of the factory class used | 
|---|
|  | 240 | to acquire our JNDI <code>InitialContext</code>.  By default, | 
|---|
|  | 241 | assumes that the standard JNDI LDAP provider will be utilized.</p> | 
|---|
|  | 242 | </td></tr><tr><td valign="center" align="left"><code>derefAliases</code></td><td valign="center" align="left"> | 
|---|
|  | 243 | <p>A string specifying how aliases are to be dereferenced during | 
|---|
|  | 244 | search operations. The allowed values are "always", "never", | 
|---|
|  | 245 | "finding" and "searching". If not specified, "always" is used.</p> | 
|---|
|  | 246 | </td></tr><tr><td valign="center" align="left"><code>digest</code></td><td valign="center" align="left"> | 
|---|
|  | 247 | <p>The digest algorithm to apply to the plaintext password offered | 
|---|
|  | 248 | by the user before comparing it with the value retrieved from the | 
|---|
|  | 249 | directory.  Valid values are those accepted for the algorithm name | 
|---|
|  | 250 | by the <code>java.security.MessageDigest</code> class. If not | 
|---|
|  | 251 | specified the plaintext password is assumed to be retrieved. Not | 
|---|
|  | 252 | required unless <code>userPassword</code> is specified</p> | 
|---|
|  | 253 | </td></tr><tr><td valign="center" align="left"><code>protocol</code></td><td valign="center" align="left"> | 
|---|
|  | 254 | <p>A string specifying the security protocol to use. If not given | 
|---|
|  | 255 | the providers default is used.</p> | 
|---|
|  | 256 | </td></tr><tr><td valign="center" align="left"><code>roleBase</code></td><td valign="center" align="left"> | 
|---|
|  | 257 | <p>The base directory entry for performing role searches. If | 
|---|
|  | 258 | not specified the top-level element in the directory context | 
|---|
|  | 259 | will be used.</p> | 
|---|
|  | 260 | </td></tr><tr><td valign="center" align="left"><code>roleName</code></td><td valign="center" align="left"> | 
|---|
|  | 261 | <p>The name of the attribute that contains role names in the | 
|---|
|  | 262 | directory entries found by a role search. In addition you can | 
|---|
|  | 263 | use the <code>userRoleName</code> property to specify the name | 
|---|
|  | 264 | of an attribute, in the user's entry, containing additional | 
|---|
|  | 265 | role names.  If <code>roleName</code> is not specified a role | 
|---|
|  | 266 | search does not take place, and roles are taken only from the | 
|---|
|  | 267 | user's entry.</p> | 
|---|
|  | 268 | </td></tr><tr><td valign="center" align="left"><code>roleSearch</code></td><td valign="center" align="left"> | 
|---|
|  | 269 | <p>The LDAP filter expression used for performing role | 
|---|
|  | 270 | searches.  Use <code>{0}</code> to substitute the | 
|---|
|  | 271 | distinguished name (DN) of the user, and/or <code>{1}</code> to | 
|---|
|  | 272 | substitute the username. If not specified a role search does | 
|---|
|  | 273 | not take place and roles are taken only from the attribute in | 
|---|
|  | 274 | the user's entry specified by the <code>userRoleName</code> | 
|---|
|  | 275 | property.</p> | 
|---|
|  | 276 | </td></tr><tr><td valign="center" align="left"><code>roleSubtree</code></td><td valign="center" align="left"> | 
|---|
|  | 277 | <p>Set to <code>true</code> if you want to search the entire | 
|---|
|  | 278 | subtree of the element specified by the <code>roleBase</code> | 
|---|
|  | 279 | property for role entries associated with the user. The | 
|---|
|  | 280 | default value of <code>false</code> causes only the top level | 
|---|
|  | 281 | to be searched.</p> | 
|---|
|  | 282 | </td></tr><tr><td valign="center" align="left"><code>userBase</code></td><td valign="center" align="left"> | 
|---|
|  | 283 | <p>The base element for user searches performed using the | 
|---|
|  | 284 | <code>userSearch</code> expression.  Not used if you are using | 
|---|
|  | 285 | the <code>userPattern</code> expression.</p> | 
|---|
|  | 286 | </td></tr><tr><td valign="center" align="left"><code>userPassword</code></td><td valign="center" align="left"> | 
|---|
|  | 287 | <p>Name of the attribute in the user's entry containing the | 
|---|
|  | 288 | user's password.  If you specify this value, JNDIRealm will | 
|---|
|  | 289 | bind to the directory using the values specified by | 
|---|
|  | 290 | <code>connectionName</code> and | 
|---|
|  | 291 | <code>connectionPassword</code> properties, and retrieve the | 
|---|
|  | 292 | corresponding attribute for comparison to the value specified | 
|---|
|  | 293 | by the user being authenticated.  If you do | 
|---|
|  | 294 | <strong>not</strong> specify this value, JNDIRealm will | 
|---|
|  | 295 | attempt a simple bind to the directory using the DN of the | 
|---|
|  | 296 | user's entry and the password presented by the user, with a | 
|---|
|  | 297 | successful bind being interpreted as an authenticated | 
|---|
|  | 298 | user.</p> | 
|---|
|  | 299 | </td></tr><tr><td valign="center" align="left"><code>userPattern</code></td><td valign="center" align="left"> | 
|---|
|  | 300 | <p>Pattern for the distinguished name (DN) of the user's | 
|---|
|  | 301 | directory entry, with <code>{0}</code> marking where the | 
|---|
|  | 302 | actual username should be inserted. You can use this property | 
|---|
|  | 303 | instead of <code>userSearch</code>, <code>userSubtree</code> | 
|---|
|  | 304 | and <code>userBase</code> when the distinguished name contains | 
|---|
|  | 305 | the username and is otherwise the same for all users.</p> | 
|---|
|  | 306 | </td></tr><tr><td valign="center" align="left"><code>userRoleName</code></td><td valign="center" align="left"> | 
|---|
|  | 307 | <p>The name of an attribute in the user's directory entry | 
|---|
|  | 308 | containing zero or more values for the names of roles assigned | 
|---|
|  | 309 | to this user.  In addition you can use the | 
|---|
|  | 310 | <code>roleName</code> property to specify the name of an | 
|---|
|  | 311 | attribute to be retrieved from individual role entries found | 
|---|
|  | 312 | by searching the directory. If <code>userRoleName</code> is | 
|---|
|  | 313 | not specified all the roles for a user derive from the role | 
|---|
|  | 314 | search.</p> | 
|---|
|  | 315 | </td></tr><tr><td valign="center" align="left"><code>userSearch</code></td><td valign="center" align="left"> | 
|---|
|  | 316 | <p>The LDAP filter expression to use when searching for a | 
|---|
|  | 317 | user's directory entry, with <code>{0}</code> marking where | 
|---|
|  | 318 | the actual username should be inserted.  Use this property | 
|---|
|  | 319 | (along with the <code>userBase</code> and | 
|---|
|  | 320 | <code>userSubtree</code> properties) instead of | 
|---|
|  | 321 | <code>userPattern</code> to search the directory for the | 
|---|
|  | 322 | user's entry.</p> | 
|---|
|  | 323 | </td></tr><tr><td valign="center" align="left"><code>userSubtree</code></td><td valign="center" align="left"> | 
|---|
|  | 324 | <p>Set to <code>true</code> if you want to search the entire | 
|---|
|  | 325 | subtree of the element specified by the <code>userBase</code> | 
|---|
|  | 326 | property for the user's entry. The default value of | 
|---|
|  | 327 | <code>false</code> causes only the top level to be searched. | 
|---|
|  | 328 | Not used if you are using the <code>userPattern</code> | 
|---|
|  | 329 | expression.</p> | 
|---|
|  | 330 | </td></tr></table> | 
|---|
|  | 331 |  | 
|---|
|  | 332 | <p>See the <a href="../../realm-howto.html">Container-Managed Security Guide</a> for more | 
|---|
|  | 333 | information on setting up container managed security using the | 
|---|
|  | 334 | JNDI Directory Realm component.</p> | 
|---|
|  | 335 |  | 
|---|
|  | 336 |  | 
|---|
|  | 337 | <h3>Memory Based Realm (org.apache.catalina.realm.MemoryRealm)</h3> | 
|---|
|  | 338 |  | 
|---|
|  | 339 | <p>The <strong>Memory Based Realm</strong> is a simple Realm implementation | 
|---|
|  | 340 | that reads user information from an XML format, and represents it as a | 
|---|
|  | 341 | collection of Java objects in memory.  This implementation is intended | 
|---|
|  | 342 | solely to get up and running with container managed security - it is NOT | 
|---|
|  | 343 | intended for production use.  As such, there are no mechanisms for | 
|---|
|  | 344 | updating the in-memory collection of users when the content of the | 
|---|
|  | 345 | underlying data file is changed.</p> | 
|---|
|  | 346 |  | 
|---|
|  | 347 | <p>The Memory Based Realm implementation supports the following | 
|---|
|  | 348 | additional attributes:</p> | 
|---|
|  | 349 |  | 
|---|
|  | 350 | <table cellpadding="5" border="1"><tr><th bgcolor="#023264" width="15%"><font color="#ffffff">Attribute</font></th><th bgcolor="#023264" width="85%"><font color="#ffffff">Description</font></th></tr><tr><td valign="center" align="left"><code>digest</code></td><td valign="center" align="left"> | 
|---|
|  | 351 | <p>The digest algorithm used to store passwords in non-plaintext | 
|---|
|  | 352 | formats. Valid values are those accepted for the algorithm name by the | 
|---|
|  | 353 | <code>java.security.MessageDigest</code> class. If not specified, | 
|---|
|  | 354 | passwords are stored in clear text.</p> | 
|---|
|  | 355 | </td></tr><tr><td valign="center" align="left"><code>pathname</code></td><td valign="center" align="left"> | 
|---|
|  | 356 | <p>Absolute or relative (to $CATALINA_BASE) pathname to the XML file | 
|---|
|  | 357 | containing our user information.  See below for details on the | 
|---|
|  | 358 | XML element format required.  If no pathname is specified, the | 
|---|
|  | 359 | default value is <code>conf/tomcat-users.xml</code>.</p> | 
|---|
|  | 360 | </td></tr></table> | 
|---|
|  | 361 |  | 
|---|
|  | 362 | <p>The XML document referenced by the <code>pathname</code> attribute must | 
|---|
|  | 363 | conform to the following requirements:</p> | 
|---|
|  | 364 | <ul> | 
|---|
|  | 365 | <li>The root (outer) element must be <code><tomcat-users></code>. | 
|---|
|  | 366 | </li> | 
|---|
|  | 367 | <li>Each authorized user must be represented by a single XML element | 
|---|
|  | 368 | <code><user></code>, nested inside the root element.</li> | 
|---|
|  | 369 | <li>Each <code><user></code> element must have the following | 
|---|
|  | 370 | attributes: | 
|---|
|  | 371 | <ul> | 
|---|
|  | 372 | <li><strong>name</strong> - Username of this user (must be unique | 
|---|
|  | 373 | within this file).</li> | 
|---|
|  | 374 | <li><strong>password</strong> - Password of this user (in | 
|---|
|  | 375 | clear text).</li> | 
|---|
|  | 376 | <li><strong>roles</strong> - Comma-delimited list of the role names | 
|---|
|  | 377 | assigned to this user.</li> | 
|---|
|  | 378 | </ul></li> | 
|---|
|  | 379 | </ul> | 
|---|
|  | 380 |  | 
|---|
|  | 381 | <p>See the <a href="../../realm-howto.html">Container-Managed Security Guide</a> for more | 
|---|
|  | 382 | information on setting up container managed security using the | 
|---|
|  | 383 | Memory Based Realm component.</p> | 
|---|
|  | 384 |  | 
|---|
|  | 385 | <h3>JAAS Realm (org.apache.catalina.realm.JAASRealm)</h3> | 
|---|
|  | 386 |  | 
|---|
|  | 387 | <p><strong>JAASRealm</strong> is an implementation of the Tomcat 6 | 
|---|
|  | 388 | <code>Realm</code> interface that authenticates users through the Java | 
|---|
|  | 389 | Authentication & Authorization Service (JAAS) framework which is now | 
|---|
|  | 390 | provided as part of the standard J2SE API.</p> | 
|---|
|  | 391 |  | 
|---|
|  | 392 | <p>Using JAASRealm gives the developer the ability to combine practically | 
|---|
|  | 393 | any conceivable security realm with Tomcat's CMA.</p> | 
|---|
|  | 394 |  | 
|---|
|  | 395 | <p>JAASRealm is prototype for Tomcat of the JAAS-based J2EE authentication | 
|---|
|  | 396 | framework for J2EE v1.4, based on the <a href="http://www.jcp.org/en/jsr/detail?id=196">JCP Specification Request | 
|---|
|  | 397 | 196</a> to enhance container-managed security and promote 'pluggable' | 
|---|
|  | 398 | authentication mechanisms whose implementations would be | 
|---|
|  | 399 | container-independent.</p> | 
|---|
|  | 400 |  | 
|---|
|  | 401 | <p>Based on the JAAS login module and principal | 
|---|
|  | 402 | (see <code>javax.security.auth.spi.LoginModule</code> and | 
|---|
|  | 403 | <code>javax.security.Principal</code>), you can develop your own security | 
|---|
|  | 404 | mechanism or wrap another third-party mechanism for integration with the CMA | 
|---|
|  | 405 | as implemented by Tomcat.</p> | 
|---|
|  | 406 |  | 
|---|
|  | 407 | <p>The JAAS Realm implementation supports the following additional | 
|---|
|  | 408 | attributes:</p> | 
|---|
|  | 409 |  | 
|---|
|  | 410 | <table cellpadding="5" border="1"><tr><th bgcolor="#023264" width="15%"><font color="#ffffff">Attribute</font></th><th bgcolor="#023264" width="85%"><font color="#ffffff">Description</font></th></tr><tr><td valign="center" align="left"><strong><code>appName</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 411 | <p>The name of the application as configured in your login configuration | 
|---|
|  | 412 | file | 
|---|
|  | 413 | (<a href="http://java.sun.com/j2se/1.4.1/docs/guide/security/jaas/tutorials/LoginConfigFile.html">JAAS LoginConfig</a>).</p> | 
|---|
|  | 414 | </td></tr><tr><td valign="center" align="left"><strong><code>userClassNames</code></strong></td><td valign="center" align="left"> | 
|---|
|  | 415 | <p>A comma-seperated list of the names of the classes that you have made | 
|---|
|  | 416 | for your user <code>Principals</code>.</p> | 
|---|
|  | 417 | </td></tr><tr><td valign="center" align="left"><code>roleClassNames</code></td><td valign="center" align="left"> | 
|---|
|  | 418 | <p>A comma-seperated list of the names of the classes that you have made | 
|---|
|  | 419 | for your role <code>Principals</code>.</p> | 
|---|
|  | 420 | </td></tr><tr><td valign="center" align="left"><code>useContextClassLoader</code></td><td valign="center" align="left"> | 
|---|
|  | 421 | <p>Instructs JAASRealm to use the context class loader for loading the | 
|---|
|  | 422 | user-specified <code>LoginModule</code> class and associated | 
|---|
|  | 423 | <code>Principal</code> classes. The default value is <code>true</code>, | 
|---|
|  | 424 | which is backwards-compatible with the way Tomcat 5 works. To load | 
|---|
|  | 425 | classes using the container's classloader, specify | 
|---|
|  | 426 | <code>false</code>.</p> | 
|---|
|  | 427 | </td></tr></table> | 
|---|
|  | 428 |  | 
|---|
|  | 429 | <p>See the <a href="../../realm-howto.html">Container-Managed Security | 
|---|
|  | 430 | Guide</a> for more information on setting up container managed security | 
|---|
|  | 431 | using the JAAS Realm component.</p> | 
|---|
|  | 432 |  | 
|---|
|  | 433 | </blockquote></td></tr></table> | 
|---|
|  | 434 |  | 
|---|
|  | 435 |  | 
|---|
|  | 436 | </blockquote></td></tr></table><table cellpadding="2" cellspacing="0" border="0"><tr><td bgcolor="#525D76"><font face="arial,helvetica.sanserif" color="#ffffff"><a name="Nested Components"><strong>Nested Components</strong></a></font></td></tr><tr><td><blockquote> | 
|---|
|  | 437 |  | 
|---|
|  | 438 | <p>No components may be nested inside a <strong>Realm</strong> element.</p> | 
|---|
|  | 439 |  | 
|---|
|  | 440 | </blockquote></td></tr></table><table cellpadding="2" cellspacing="0" border="0"><tr><td bgcolor="#525D76"><font face="arial,helvetica.sanserif" color="#ffffff"><a name="Special Features"><strong>Special Features</strong></a></font></td></tr><tr><td><blockquote> | 
|---|
|  | 441 |  | 
|---|
|  | 442 | <p>See <a href="host.html">Single Sign On</a> for information about | 
|---|
|  | 443 | configuring Single Sign On support for a virtual host.</p> | 
|---|
|  | 444 |  | 
|---|
|  | 445 | </blockquote></td></tr></table></td></tr><!--FOOTER SEPARATOR--><tr><td colspan="2"><hr size="1" noshade></td></tr><!--PAGE FOOTER--><tr><td colspan="2"><div align="center"><font size="-1" color="#525D76"><em> | 
|---|
|  | 446 | Copyright © 1999-2008, Apache Software Foundation | 
|---|
|  | 447 | </em></font></div></td></tr></table></body></html> | 
|---|