source: nutchez-0.1/tomcat/webapps/docs/config/printer/realm.html @ 95

Last change on this file since 95 was 66, checked in by waue, 16 years ago

NutchEz - an easy way to nutch

File size: 29.2 KB
Line 
1<html><head><META http-equiv="Content-Type" content="text/html; charset=iso-8859-1"><title>Apache Tomcat Configuration Reference - The Realm Component</title><meta value="Craig R. McClanahan" name="author"><meta value="craigmcc@apache.org" name="email"></head><body vlink="#525D76" alink="#525D76" link="#525D76" text="#000000" bgcolor="#ffffff"><table cellspacing="0" width="100%" border="0"><!--PAGE HEADER--><tr><td><!--PROJECT LOGO--><a href="http://tomcat.apache.org/"><img border="0" alt="
2    The Apache Tomcat Servlet/JSP Container
3  " align="right" src="../../images/tomcat.gif"></a></td><td><font face="arial,helvetica,sanserif"><h1>Apache Tomcat 6.0</h1></font></td><td><!--APACHE LOGO--><a href="http://www.apache.org/"><img border="0" alt="Apache Logo" align="right" src="../../images/asf-logo.gif"></a></td></tr></table><table cellspacing="4" width="100%" border="0"><!--HEADER SEPARATOR--><tr><td colspan="2"><hr size="1" noshade></td></tr><tr><!--RIGHT SIDE MAIN BODY--><td align="left" valign="top" width="80%"><table cellspacing="4" width="100%" border="0"><tr><td valign="top" align="left"><h1>Apache Tomcat Configuration Reference</h1><h2>The Realm Component</h2></td><td nowrap="true" valign="top" align="right"><img border="0" hspace="0" vspace="0" height="1" width="1" src="../../images/void.gif"></td></tr></table><table cellpadding="2" cellspacing="0" border="0"><tr><td bgcolor="#525D76"><font face="arial,helvetica.sanserif" color="#ffffff"><a name="Introduction"><strong>Introduction</strong></a></font></td></tr><tr><td><blockquote>
4
5  <p>A <strong>Realm</strong> element represents a "database" of usernames,
6  passwords, and <em>roles</em> (similar to Unix <em>groups</em>) assigned
7  to those users.  Different implementations of Realm allow Catalina to be
8  integrated into environments where such authentication information is already
9  being created and maintained, and then utilize that information to implement
10  <em>Container Managed Security</em> as described in the Servlet
11  Specification.</p>
12
13  <p>You may nest a Realm inside any Catalina container
14  <a href="engine.html">Engine</a>, <a href="host.html">Host</a>, or
15  <a href="context.html">Context</a>).  In addition, Realms associated with
16  an Engine or a Host are automatically inherited by lower-level
17  containers, unless explicitly overridden.</p>
18
19  <p>For more in-depth information about container managed security in web
20  applications, as well as more information on configuring and using the
21  standard realm component implementations, please see the
22  <a href="../../realm-howto.html">Container-Managed Security Guide</a>.
23  </p>
24
25    <blockquote><em>
26    <p>The description below uses the variable name $CATALINA_BASE to refer the
27    base directory against which most relative paths are resolved. If you have
28    not configured Tomcat 6 for multiple instances by setting a CATALINA_BASE
29    directory, then $CATALINA_BASE will be set to the value of $CATALINA_HOME,
30    the directory into which you have installed Tomcat 6.</p>
31    </em></blockquote>
32
33</blockquote></td></tr></table><table cellpadding="2" cellspacing="0" border="0"><tr><td bgcolor="#525D76"><font face="arial,helvetica.sanserif" color="#ffffff"><a name="Attributes"><strong>Attributes</strong></a></font></td></tr><tr><td><blockquote>
34
35  <table cellpadding="2" cellspacing="0" border="0"><tr><td bgcolor="#828DA6"><font face="arial,helvetica.sanserif" color="#ffffff"><a name="Common Attributes"><strong>Common Attributes</strong></a></font></td></tr><tr><td><blockquote>
36
37    <p>All implementations of <strong>Realm</strong>
38    support the following attributes:</p>
39
40    <table cellpadding="5" border="1"><tr><th bgcolor="#023264" width="15%"><font color="#ffffff">Attribute</font></th><th bgcolor="#023264" width="85%"><font color="#ffffff">Description</font></th></tr><tr><td valign="center" align="left"><strong><code>className</code></strong></td><td valign="center" align="left">
41        <p>Java class name of the implementation to use.  This class must
42        implement the <code>org.apache.catalina.Realm</code> interface.</p>
43      </td></tr></table>
44
45  </blockquote></td></tr></table>
46
47
48  <table cellpadding="2" cellspacing="0" border="0"><tr><td bgcolor="#828DA6"><font face="arial,helvetica.sanserif" color="#ffffff"><a name="Standard Implementation"><strong>Standard Implementation</strong></a></font></td></tr><tr><td><blockquote>
49
50    <p>Unlike most Catalina components, there are several standard
51    <strong>Realm</strong> implementations available.  As a result,
52    the <code>className</code> attribute MUST be used to select the
53    implementation you wish to use.</p>
54
55    <h3>JDBC Database Realm (org.apache.catalina.realm.JDBCRealm)</h3>
56
57    <p>The <strong>JDBC Database Realm</strong> connects Catalina to
58    a relational database, accessed through an appropriate JDBC driver,
59    to perform lookups of usernames, passwords, and their associated
60    roles.  Because the lookup is done each time that it is required,
61    changes to the database will be immediately reflected in the
62    information used to authenticate new logins.</p>
63
64    <p>A rich set of additional attributes lets you configure the required
65    connection to the underlying database, as well as the table and
66    column names used to retrieve the required information:</p>
67
68    <table cellpadding="5" border="1"><tr><th bgcolor="#023264" width="15%"><font color="#ffffff">Attribute</font></th><th bgcolor="#023264" width="85%"><font color="#ffffff">Description</font></th></tr><tr><td valign="center" align="left"><strong><code>connectionName</code></strong></td><td valign="center" align="left">
69        <p>The database username to use when establishing the JDBC
70        connection.</p>
71      </td></tr><tr><td valign="center" align="left"><strong><code>connectionPassword</code></strong></td><td valign="center" align="left">
72        <p>The database password to use when establishing the JDBC
73        connection.</p>
74      </td></tr><tr><td valign="center" align="left"><strong><code>connectionURL</code></strong></td><td valign="center" align="left">
75        <p>The connection URL to be passed to the JDBC driver when
76        establishing a database connection.</p>
77      </td></tr><tr><td valign="center" align="left"><code>digest</code></td><td valign="center" align="left">
78        <p>The name of the <code>MessageDigest</code> algorithm used
79        to encode user passwords stored in the database.  If not specified,
80        user passwords are assumed to be stored in clear-text.</p>
81      </td></tr><tr><td valign="center" align="left"><code>digestEncoding</code></td><td valign="center" align="left">
82        <p>The charset for encoding digests.  If not specified, the platform
83        default will be used.</p>
84      </td></tr><tr><td valign="center" align="left"><strong><code>driverName</code></strong></td><td valign="center" align="left">
85        <p>Fully qualified Java class name of the JDBC driver to be
86        used to connect to the authentication database.</p>
87      </td></tr><tr><td valign="center" align="left"><strong><code>roleNameCol</code></strong></td><td valign="center" align="left">
88        <p>Name of the column, in the "user roles" table, which contains
89        a role name assigned to the corresponding user.</p>
90      </td></tr><tr><td valign="center" align="left"><strong><code>userCredCol</code></strong></td><td valign="center" align="left">
91        <p>Name of the column, in the "users" table, which contains
92        the user's credentials (i.e. password(.  If a value for the
93        <code>digest</code> attribute is specified, this component
94        will assume that the passwords have been encoded with the
95        specified algorithm.  Otherwise, they will be assumed to be
96        in clear text.</p>
97      </td></tr><tr><td valign="center" align="left"><strong><code>userNameCol</code></strong></td><td valign="center" align="left">
98        <p>Name of the column, in the "users" and "user roles" table,
99        that contains the user's username.</p>
100      </td></tr><tr><td valign="center" align="left"><strong><code>userRoleTable</code></strong></td><td valign="center" align="left">
101        <p>Name of the "user roles" table, which must contain columns
102        named by the <code>userNameCol</code> and <code>roleNameCol</code>
103        attributes.</p>
104      </td></tr><tr><td valign="center" align="left"><strong><code>userTable</code></strong></td><td valign="center" align="left">
105        <p>Name of the "users" table, which must contain columns named
106        by the <code>userNameCol</code> and <code>userCredCol</code>
107        attributes.</p>
108      </td></tr></table>
109
110    <p>See the <a href="../../realm-howto.html">Container-Managed Security Guide</a> for more
111    information on setting up container managed security using the
112    JDBC Database Realm component.</p>
113
114
115    <h3>
116      DataSource Database Realm (org.apache.catalina.realm.DataSourceRealm)
117    </h3>
118
119    <p>The <strong>DataSource Database Realm</strong> connects Catalina to
120    a relational database, accessed through a JNDI named JDBC DataSource
121    to perform lookups of usernames, passwords, and their associated
122    roles.  Because the lookup is done each time that it is required,
123    changes to the database will be immediately reflected in the
124    information used to authenticate new logins.</p>
125
126    <p>The JDBC Realm uses a single db connection. This requires that
127    realm based authentication be synchronized, i.e. only one authentication
128    can be done at a time. This could be a bottleneck for applications
129    with high volumes of realm based authentications.</p>
130
131    <p>The DataSource Database Realm supports simultaneous realm based
132    authentications and allows the underlying JDBC DataSource to
133    handle optimizations like database connection pooling.</p>
134
135    <p>A rich set of additional attributes lets you configure the name
136    of the JNDI JDBC DataSource, as well as the table and
137    column names used to retrieve the required information:</p>
138
139    <table cellpadding="5" border="1"><tr><th bgcolor="#023264" width="15%"><font color="#ffffff">Attribute</font></th><th bgcolor="#023264" width="85%"><font color="#ffffff">Description</font></th></tr><tr><td valign="center" align="left"><strong><code>dataSourceName</code></strong></td><td valign="center" align="left">
140        <p>The name of the JNDI JDBC DataSource for this Realm.</p>
141      </td></tr><tr><td valign="center" align="left"><code>digest</code></td><td valign="center" align="left">
142        <p>The name of the <code>MessageDigest</code> algorithm used
143        to encode user passwords stored in the database.  If not specified,
144        user passwords are assumed to be stored in clear-text.</p>
145      </td></tr><tr><td valign="center" align="left"><code>localDataSource</code></td><td valign="center" align="left">
146        <p>When the realm is nested inside a Context element, this allows the
147        realm to use a DataSource defined for the Context rather than a global
148        DataSource.  If not specified, the default is <code>false</code>: use a
149        global DataSource.</p>
150      </td></tr><tr><td valign="center" align="left"><strong><code>roleNameCol</code></strong></td><td valign="center" align="left">
151        <p>Name of the column, in the "user roles" table, which contains
152        a role name assigned to the corresponding user.</p>
153      </td></tr><tr><td valign="center" align="left"><strong><code>userCredCol</code></strong></td><td valign="center" align="left">
154        <p>Name of the column, in the "users" table, which contains
155        the user's credentials (i.e. password(.  If a value for the
156        <code>digest</code> attribute is specified, this component
157        will assume that the passwords have been encoded with the
158        specified algorithm.  Otherwise, they will be assumed to be
159        in clear text.</p>
160      </td></tr><tr><td valign="center" align="left"><strong><code>userNameCol</code></strong></td><td valign="center" align="left">
161        <p>Name of the column, in the "users" and "user roles" table,
162        that contains the user's username.</p>
163      </td></tr><tr><td valign="center" align="left"><strong><code>userRoleTable</code></strong></td><td valign="center" align="left">
164        <p>Name of the "user roles" table, which must contain columns
165        named by the <code>userNameCol</code> and <code>roleNameCol</code>
166        attributes.</p>
167      </td></tr><tr><td valign="center" align="left"><strong><code>userTable</code></strong></td><td valign="center" align="left">
168        <p>Name of the "users" table, which must contain columns named
169        by the <code>userNameCol</code> and <code>userCredCol</code>
170        attributes.</p>
171      </td></tr></table>
172
173    <p>See the <a href="../../realm-howto.html#DataSourceRealm">
174    DataSource Realm HOW-TO</a> for more information on setting up container
175    managed security using the DataSource Database Realm component.</p>
176
177
178    <h3>JNDI Directory Realm (org.apache.catalina.realm.JNDIRealm)</h3>
179
180
181    <p>The <strong>JNDI Directory Realm</strong> connects Catalina to
182    an LDAP Directory, accessed through an appropriate JNDI driver,
183    that stores usernames, passwords, and their associated
184    roles. Changes to the directory are immediately reflected in the
185    information used to authenticate new logins.</p>
186
187
188    <p>The directory realm supports a variety of approaches to using
189    LDAP for authentication:</p>
190
191    <ul>
192    <li>The realm can either use a pattern to determine the
193    distinguished name (DN) of the user's directory entry, or search
194    the directory to locate that entry.
195    </li>
196
197    <li>The realm can authenticate the user either by binding to the
198    directory with the DN of the user's entry and the password
199    presented by the user, or by retrieving the password from the
200    user's entry and performing a comparison locally.
201    </li>
202
203    <li>Roles may be represented in the directory as explicit entries
204    found by a directory search (e.g. group entries of which the user
205    is a member), as the values of an attribute in the user's entry,
206    or both.
207    </li>
208    </ul>
209
210    <p> A rich set of additional attributes lets you configure the
211    required behaviour as well as the connection to the underlying
212    directory and the element and attribute names used to retrieve
213    information from the directory:</p>
214
215    <table cellpadding="5" border="1"><tr><th bgcolor="#023264" width="15%"><font color="#ffffff">Attribute</font></th><th bgcolor="#023264" width="85%"><font color="#ffffff">Description</font></th></tr><tr><td valign="center" align="left"><code>alternateURL</code></td><td valign="center" align="left">
216         <p>If a socket connection can not be made to the provider at
217         the <code>connectionURL</code> an attempt will be made to use the
218         <code>alternateURL</code>.</p>
219       </td></tr><tr><td valign="center" align="left"><code>authentication</code></td><td valign="center" align="left">
220         <p>A string specifying the type of authentication to use.
221         "none", "simple", "strong" or a provider specific definition
222         can be used. If no value is given the providers default is used.</p>
223       </td></tr><tr><td valign="center" align="left"><code>connectionName</code></td><td valign="center" align="left">
224        <p>The directory username to use when establishing a
225        connection to the directory for LDAP search operations. If not
226        specified an anonymous connection is made, which is often
227        sufficient unless you specify the <code>userPassword</code>
228        property.</p>
229      </td></tr><tr><td valign="center" align="left"><code>connectionPassword</code></td><td valign="center" align="left">
230        <p>The directory password to use when establishing a
231        connection to the directory for LDAP search operations. If not
232        specified an anonymous connection is made, which is often
233        sufficient unless you specify the <code>userPassword</code>
234        property.</p>
235      </td></tr><tr><td valign="center" align="left"><strong><code>connectionURL</code></strong></td><td valign="center" align="left">
236        <p>The connection URL to be passed to the JNDI driver when
237        establishing a connection to the directory.</p>
238      </td></tr><tr><td valign="center" align="left"><code>contextFactory</code></td><td valign="center" align="left">
239        <p>Fully qualified Java class name of the factory class used
240        to acquire our JNDI <code>InitialContext</code>.  By default,
241        assumes that the standard JNDI LDAP provider will be utilized.</p>
242      </td></tr><tr><td valign="center" align="left"><code>derefAliases</code></td><td valign="center" align="left">
243        <p>A string specifying how aliases are to be dereferenced during
244        search operations. The allowed values are "always", "never",
245        "finding" and "searching". If not specified, "always" is used.</p>
246      </td></tr><tr><td valign="center" align="left"><code>digest</code></td><td valign="center" align="left">
247        <p>The digest algorithm to apply to the plaintext password offered
248        by the user before comparing it with the value retrieved from the
249        directory.  Valid values are those accepted for the algorithm name
250        by the <code>java.security.MessageDigest</code> class. If not
251        specified the plaintext password is assumed to be retrieved. Not
252        required unless <code>userPassword</code> is specified</p>
253      </td></tr><tr><td valign="center" align="left"><code>protocol</code></td><td valign="center" align="left">
254         <p>A string specifying the security protocol to use. If not given
255         the providers default is used.</p>
256      </td></tr><tr><td valign="center" align="left"><code>roleBase</code></td><td valign="center" align="left">
257        <p>The base directory entry for performing role searches. If
258        not specified the top-level element in the directory context
259        will be used.</p>
260      </td></tr><tr><td valign="center" align="left"><code>roleName</code></td><td valign="center" align="left">
261        <p>The name of the attribute that contains role names in the
262        directory entries found by a role search. In addition you can
263        use the <code>userRoleName</code> property to specify the name
264        of an attribute, in the user's entry, containing additional
265        role names.  If <code>roleName</code> is not specified a role
266        search does not take place, and roles are taken only from the
267        user's entry.</p>
268      </td></tr><tr><td valign="center" align="left"><code>roleSearch</code></td><td valign="center" align="left">
269        <p>The LDAP filter expression used for performing role
270        searches.  Use <code>{0}</code> to substitute the
271        distinguished name (DN) of the user, and/or <code>{1}</code> to
272        substitute the username. If not specified a role search does
273        not take place and roles are taken only from the attribute in
274        the user's entry specified by the <code>userRoleName</code>
275        property.</p>
276      </td></tr><tr><td valign="center" align="left"><code>roleSubtree</code></td><td valign="center" align="left">
277        <p>Set to <code>true</code> if you want to search the entire
278        subtree of the element specified by the <code>roleBase</code>
279        property for role entries associated with the user. The
280        default value of <code>false</code> causes only the top level
281        to be searched.</p>
282      </td></tr><tr><td valign="center" align="left"><code>userBase</code></td><td valign="center" align="left">
283        <p>The base element for user searches performed using the
284        <code>userSearch</code> expression.  Not used if you are using
285        the <code>userPattern</code> expression.</p>
286      </td></tr><tr><td valign="center" align="left"><code>userPassword</code></td><td valign="center" align="left">
287        <p>Name of the attribute in the user's entry containing the
288        user's password.  If you specify this value, JNDIRealm will
289        bind to the directory using the values specified by
290        <code>connectionName</code> and
291        <code>connectionPassword</code> properties, and retrieve the
292        corresponding attribute for comparison to the value specified
293        by the user being authenticated.  If you do
294        <strong>not</strong> specify this value, JNDIRealm will
295        attempt a simple bind to the directory using the DN of the
296        user's entry and the password presented by the user, with a
297        successful bind being interpreted as an authenticated
298        user.</p>
299      </td></tr><tr><td valign="center" align="left"><code>userPattern</code></td><td valign="center" align="left">
300        <p>Pattern for the distinguished name (DN) of the user's
301        directory entry, with <code>{0}</code> marking where the
302        actual username should be inserted. You can use this property
303        instead of <code>userSearch</code>, <code>userSubtree</code>
304        and <code>userBase</code> when the distinguished name contains
305        the username and is otherwise the same for all users.</p>
306      </td></tr><tr><td valign="center" align="left"><code>userRoleName</code></td><td valign="center" align="left">
307        <p>The name of an attribute in the user's directory entry
308        containing zero or more values for the names of roles assigned
309        to this user.  In addition you can use the
310        <code>roleName</code> property to specify the name of an
311        attribute to be retrieved from individual role entries found
312        by searching the directory. If <code>userRoleName</code> is
313        not specified all the roles for a user derive from the role
314        search.</p>
315      </td></tr><tr><td valign="center" align="left"><code>userSearch</code></td><td valign="center" align="left">
316        <p>The LDAP filter expression to use when searching for a
317        user's directory entry, with <code>{0}</code> marking where
318        the actual username should be inserted.  Use this property
319        (along with the <code>userBase</code> and
320        <code>userSubtree</code> properties) instead of
321        <code>userPattern</code> to search the directory for the
322        user's entry.</p>
323      </td></tr><tr><td valign="center" align="left"><code>userSubtree</code></td><td valign="center" align="left">
324        <p>Set to <code>true</code> if you want to search the entire
325        subtree of the element specified by the <code>userBase</code>
326        property for the user's entry. The default value of
327        <code>false</code> causes only the top level to be searched.
328        Not used if you are using the <code>userPattern</code>
329        expression.</p>
330      </td></tr></table>
331
332    <p>See the <a href="../../realm-howto.html">Container-Managed Security Guide</a> for more
333    information on setting up container managed security using the
334    JNDI Directory Realm component.</p>
335
336
337    <h3>Memory Based Realm (org.apache.catalina.realm.MemoryRealm)</h3>
338
339    <p>The <strong>Memory Based Realm</strong> is a simple Realm implementation
340    that reads user information from an XML format, and represents it as a
341    collection of Java objects in memory.  This implementation is intended
342    solely to get up and running with container managed security - it is NOT
343    intended for production use.  As such, there are no mechanisms for
344    updating the in-memory collection of users when the content of the
345    underlying data file is changed.</p>
346
347    <p>The Memory Based Realm implementation supports the following
348    additional attributes:</p>
349
350    <table cellpadding="5" border="1"><tr><th bgcolor="#023264" width="15%"><font color="#ffffff">Attribute</font></th><th bgcolor="#023264" width="85%"><font color="#ffffff">Description</font></th></tr><tr><td valign="center" align="left"><code>digest</code></td><td valign="center" align="left">
351        <p>The digest algorithm used to store passwords in non-plaintext
352        formats. Valid values are those accepted for the algorithm name by the
353        <code>java.security.MessageDigest</code> class. If not specified,
354        passwords are stored in clear text.</p>
355      </td></tr><tr><td valign="center" align="left"><code>pathname</code></td><td valign="center" align="left">
356        <p>Absolute or relative (to $CATALINA_BASE) pathname to the XML file
357        containing our user information.  See below for details on the
358        XML element format required.  If no pathname is specified, the
359        default value is <code>conf/tomcat-users.xml</code>.</p>
360      </td></tr></table>
361
362    <p>The XML document referenced by the <code>pathname</code> attribute must
363    conform to the following requirements:</p>
364    <ul>
365    <li>The root (outer) element must be <code>&lt;tomcat-users&gt;</code>.
366        </li>
367    <li>Each authorized user must be represented by a single XML element
368        <code>&lt;user&gt;</code>, nested inside the root element.</li>
369    <li>Each <code>&lt;user&gt;</code> element must have the following
370        attributes:
371        <ul>
372        <li><strong>name</strong> - Username of this user (must be unique
373            within this file).</li>
374        <li><strong>password</strong> - Password of this user (in
375            clear text).</li>
376        <li><strong>roles</strong> - Comma-delimited list of the role names
377            assigned to this user.</li>
378        </ul></li>
379    </ul>
380
381    <p>See the <a href="../../realm-howto.html">Container-Managed Security Guide</a> for more
382    information on setting up container managed security using the
383    Memory Based Realm component.</p>
384
385    <h3>JAAS Realm (org.apache.catalina.realm.JAASRealm)</h3>
386
387    <p><strong>JAASRealm</strong> is an implementation of the Tomcat 6
388    <code>Realm</code> interface that authenticates users through the Java
389    Authentication &amp; Authorization Service (JAAS) framework which is now
390    provided as part of the standard J2SE API.</p>
391
392    <p>Using JAASRealm gives the developer the ability to combine practically
393    any conceivable security realm with Tomcat's CMA.</p>
394
395    <p>JAASRealm is prototype for Tomcat of the JAAS-based J2EE authentication
396    framework for J2EE v1.4, based on the <a href="http://www.jcp.org/en/jsr/detail?id=196">JCP Specification Request
397    196</a> to enhance container-managed security and promote 'pluggable'
398    authentication mechanisms whose implementations would be
399    container-independent.</p>
400
401    <p>Based on the JAAS login module and principal
402    (see <code>javax.security.auth.spi.LoginModule</code> and
403    <code>javax.security.Principal</code>), you can develop your own security
404    mechanism or wrap another third-party mechanism for integration with the CMA
405    as implemented by Tomcat.</p>
406
407    <p>The JAAS Realm implementation supports the following additional
408    attributes:</p>
409
410    <table cellpadding="5" border="1"><tr><th bgcolor="#023264" width="15%"><font color="#ffffff">Attribute</font></th><th bgcolor="#023264" width="85%"><font color="#ffffff">Description</font></th></tr><tr><td valign="center" align="left"><strong><code>appName</code></strong></td><td valign="center" align="left">
411       <p>The name of the application as configured in your login configuration
412       file
413       (<a href="http://java.sun.com/j2se/1.4.1/docs/guide/security/jaas/tutorials/LoginConfigFile.html">JAAS LoginConfig</a>).</p>
414      </td></tr><tr><td valign="center" align="left"><strong><code>userClassNames</code></strong></td><td valign="center" align="left">
415        <p>A comma-seperated list of the names of the classes that you have made
416        for your user <code>Principals</code>.</p>
417      </td></tr><tr><td valign="center" align="left"><code>roleClassNames</code></td><td valign="center" align="left">
418        <p>A comma-seperated list of the names of the classes that you have made
419        for your role <code>Principals</code>.</p>
420      </td></tr><tr><td valign="center" align="left"><code>useContextClassLoader</code></td><td valign="center" align="left">
421        <p>Instructs JAASRealm to use the context class loader for loading the
422        user-specified <code>LoginModule</code> class and associated
423        <code>Principal</code> classes. The default value is <code>true</code>,
424        which is backwards-compatible with the way Tomcat 5 works. To load
425        classes using the container's classloader, specify
426        <code>false</code>.</p>
427      </td></tr></table>
428
429    <p>See the <a href="../../realm-howto.html">Container-Managed Security
430    Guide</a> for more information on setting up container managed security
431    using the JAAS Realm component.</p>
432
433  </blockquote></td></tr></table>
434
435
436</blockquote></td></tr></table><table cellpadding="2" cellspacing="0" border="0"><tr><td bgcolor="#525D76"><font face="arial,helvetica.sanserif" color="#ffffff"><a name="Nested Components"><strong>Nested Components</strong></a></font></td></tr><tr><td><blockquote>
437
438  <p>No components may be nested inside a <strong>Realm</strong> element.</p>
439
440</blockquote></td></tr></table><table cellpadding="2" cellspacing="0" border="0"><tr><td bgcolor="#525D76"><font face="arial,helvetica.sanserif" color="#ffffff"><a name="Special Features"><strong>Special Features</strong></a></font></td></tr><tr><td><blockquote>
441
442  <p>See <a href="host.html">Single Sign On</a> for information about
443  configuring Single Sign On support for a virtual host.</p>
444
445</blockquote></td></tr></table></td></tr><!--FOOTER SEPARATOR--><tr><td colspan="2"><hr size="1" noshade></td></tr><!--PAGE FOOTER--><tr><td colspan="2"><div align="center"><font size="-1" color="#525D76"><em>
446        Copyright &copy; 1999-2008, Apache Software Foundation
447        </em></font></div></td></tr></table></body></html>
Note: See TracBrowser for help on using the repository browser.