[
https://issues.apache.org/jira/browse/ISIS-3305?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17647893#comment-17647893
]
Andi Huber commented on ISIS-3305:
----------------------------------
>From a developer perspective there should be a simplified decision process
>when selecting a security model for their application:
*A) Select your authenticator* (single choice):
* default (Spring autoconfigure)
* OAuth/OpenId
* Keycloak
* Bypass
* Apache Shiro (optional, if easy to migrate)
*B) Select your authorizor* (single choice):
* default (Spring autoconfigure)
* SecMan (could be autoconfigured, that is, if its on the class-path, use it)
* Bypass
* Apache Shiro (optional, if easy to migrate)
> [DISCUSS] Re-platform on top of Spring security.
> ------------------------------------------------
>
> Key: ISIS-3305
> URL: https://issues.apache.org/jira/browse/ISIS-3305
> Project: Isis
> Issue Type: Task
> Affects Versions: 2.0.0-M9
> Reporter: Daniel Keir Haywood
> Priority: Major
> Fix For: 2.1.0
>
>
> as per [https://the-asf.slack.com/archives/CFC42LWBV/p1670661588201299]
>
> Andi's wish list of changes is:
> # drop Shiro support
> # drop Keycloak support
> # instead fully integrate with Spring Security
> # drop SudoService
> # instead provide impersonation via a specialized login page
> # drop Wicket's .../login, .../logout
> # instead provide simple replacements under /security/... central to the
> application (not using Wicket)
> Why? Focus on one security stack and do that integration well
>
--
This message was sent by Atlassian Jira
(v8.20.10#820010)