Quoting Murray Altheim <[EMAIL PROTECTED]>:

> Gianugo Rabellino wrote:
> 
> > [EMAIL PROTECTED] wrote:
> > 
> >> I read that the authentication options in Xindice are on the TODO list:
> >> (#ref: 
> >> http://marc.theaimsgroup.com/?l=xindice-users&m=101431923219207&w=2)
> >>
> >> I have noticed that the getCollection method has (id,username,password)
> >> where username and password are used to authenticate the access to the 
> >> database.
> >>
> >> I was wondering how it is possible to create a collection that is
> >> protected by a (username,password) schema.
> > 
> > 
> > Not yet. It's still in the TODO, I hope to be able to come up with some 
> > kind of (maybe rough) solution shortly.
> 
> 
> You might look into all the new stuff in Java 1.4 rather than
> inventing something. There's a lot of new APIs, such as the
> Java Cryptography Extension and Java Authentication and
> Authorization Service (JAAS). Between that and the logging
> and preferences APIs it's taking a lot of the grunt work out
> of a project. I currently have my own logging and preferences
> code and am seriously considering dumping it in favour of
> the new APIs (though I'm currently using Java 1.3.1).
> 
> Just my 2p.
> 
> Murray
> 
> ......................................................................
> Murray Altheim                  <http://kmi.open.ac.uk/people/murray/>
> Knowledge Media Institute
> The Open University, Milton Keynes, Bucks, MK7 6AA, UK
> 
>       In the evening
>       The rice leaves in the garden
>       Rustle in the autumn wind
>       That blows through my reed hut.  -- Minamoto no Tsunenobu
> 

I will tell you the reason I am asking:
lets say I have a collection for a user called 'Maria', under that
collection I will have one document called 'uid' and two other collections
lets say of personal data.

- [Maria]
     - uid (doc with username, password)
     - [pdata1]
     - [pdata2]
        - more..

now, I write an application that uses Xindice, and authenticate the user
'Maria' with her username&password by the 'uid' document. all fine until now...

but, consider a malicious user that knows I am using Xindice. He can easly
write an application that gets the collections of personal data that 
resides in the 'Maria' collection. now - he can read all the personal 
information without the need to authenticate...

Is there some method of avoiding this ?
did anyone before me encounter this problem and find a way to override it ?
Or, is there a hole in my logic ? ;)

Thank you - Gianugo Rabellino  for your fast response.

Thank you in advance for all you help !
Merry Christmas,
Moran.

-------------------------------------------------
This mail sent through JCE IMP: http://portal.jce.ac.il/horde/
Main Web Page http://www.jce.ac.il

Reply via email to