I am missing a key piece of information that I have not been able to
find in the past few days of searching.  How does the <security-role>
and <role-name> tag work in relation to the <auth-constraint> and
<role-name> tag?  Do they have any relation?

I am trying to change the security model of a proprietary application
and they were using the JDBC Realm Form authentication.  I want to
change it to use the JNDI Realm and go against a Oracle Internet
Directory instance for authentication.  I was able to successfully
change the security example packaged with tomcat to use this JNDI
Realm.

I have made the same changes to the proprietary app and I am
successfully authenticating but I believe I am failing authorization
somewhere.  However I can find no code that checks for isUserInRole().
Could someone please point me in the direction of some documentation
that explains what the <security-role> tag does and how it does it
since I think that the problem lies in the fact the application is not
getting the role it is expecting?

Thanks,

Mike

---------------------------------------------------------------------
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to