Correct, Tomcat does not use the <security-realm-name> element from the
geronimo-web.xml.
How it works is...
The Tomcat realms take the name of the object it is associated with.
Tomcat objects inherit Realms from top down. If a Realm is associated
with an Engine, then the Host(s) and Context(s) inherit that realm. The
same goes for Hosts...if its associated with that host, then all
Contexts under that Host inherits the Realm. Here is the example...
There is typically a geronimo realm GBean that is created...lets use the
example of the one in the tomcat-config.xml. Notice the realmName
attribute is "Geronimo".
Then a TomcatRealm is attached either the Engine, Host, or Context
levels. In this instance we have the TomcatRealm attached to the server
(i.e. the Engine) Notice the Engine object in tomcat-config.xml has a
name parameter of "Geronimo". All Contexts under that Engine will
associate itself with the "Geronimo" realm name. So this is Server-wide.
If I wish to change a Context to specifically use its own specific
realm, its name is the context root/path name. So say I have created an
application that has a context root of "testme", then I can attach a
Realm object to it, and this Realm object will expect to find a realm
called "testme".
This is how standard tomcat realms work, and it is because normally,
J2EE/JAAS uses a login.config file, where we declare our realms with
login modules like this:
<name used by application to refer to this entry> {
<LoginModule> <flag> <LoginModule options>;
<optional additional LoginModules, flags and options>;
};
(See http://tinyurl.com/dz6bz for more info)
In Geronimo, since we don't use a login.config, instead, we wire these
up via 2 GBeans...a realm and a loginmodule. The application name
really becomes the realm name in our world. So to keep in line with the
login.config configuration, we use the realmName of the
GenericSecurityRealm matched up with the application name (or path of
our Context).
It would not be too difficult to use the <security-realm-name> as an
override at this point, but Tomcat has stated that setName() on the
Realms is deprecated and thus will disappear in the future. This does
not preclude us rewriting the Realms, but it would break compatibility
with the slew of Realm objects offered by Tomcat in the future.
I would suggest we examine why we use <security-realm-name> and why not
follow the application name paradigm that appears to be a standard.
Jeff
Aaron Mulder wrote:
So in web apps, the developer provides a list of roles in web.xml,
and then we let you map any principals from any Geronimo security realms
to the J2EE roles using the <security> element in geronimo-web.xml (it's
quite possible to allow principals from multiple realms).
However, on top of that, there's a <security-realm-name> element
in geronimo-web.xml, which appears to be used by Jetty and not Tomcat.
This appears to be used to set the JettyJAASRealm on the
JettyWebAppContext (see JettyWebAppContext.java:257).
I'm assuming that when you log in to Jetty, it authenticates you
against the security realm named in the <security-realm-name> element, and
then authorizes you against the mappings performed in the <security>
element. So logically, it wouldn't help you to include principals from
any other realm in the <security> element, but we don't enforce that in
the schemas.
If that's true, then what realm does Tomcat authenticate against?
And what realm do EJBs authenticate against? Both Tomcat and EJBs appear
to only use the <security> element (Tomcat ignores the
<security-realm-name> element AFAICT and openejb-jar.xml doesn't have
one).
Thanks,
Aaron