Use this topic to programmatically secure your EJB applications.
About this taskProgrammatic security is used by security-aware applications when declarative security alone is not sufficient to express the security model of the application. The javax.ejb.EJBContext application programming interface (API) provides two methods whereby the bean provider can access security information about the enterprise bean caller.
You can enable a login module to indicate which principal class is returned by these calls.
When the isCallerInRole method is used, declare a security-role-ref element in the deployment descriptor with a role-name that is subelement containing the role name that is passed to this method. Because actual roles are created during the assembly stage of the application, you can use a logical role as the role name and provide enough hints to the assembler in the description of the security-role-ref element to link that role to an actual role. During assembly, the assembler creates a role-link subelement to link the role-name to the actual role. Creation of a security-role-ref element is possible if an assembly tool such as Rational Application Developer (RAD) is used. You also can create the security-role-ref element during the assembly stage using an assembly tool.
ExampleHard coding security policies in applications is strongly discouraged. The Java 2 Platform, Enterprise Edition (J2EE) security model capabilities of declaratively specifying security policies is encouraged wherever possible. Use these APIs to develop security-aware EJB applications.
Using J2EE security model capabilities to specify security policies declaratively is useful when an EJB application wants to access external resources and wants to control the access to these external resources using its own authorization table (external-resource to user mapping). In this case, use the getCallerPrincipal method to get the caller identity and then the application can consult its own authorization table to perform authorization. The caller identification also can help retrieve the corresponding user information from an external source, such as database or from another enterprise bean. You can use the isCallerInRole method in a similar way. After development, you can create a security-role-ref element:
<security-role-ref> <description>Provide hints to assembler for linking this role-name to actual role here<\description> <role-name>Mgr<\role-name> </security-role-ref>During assembly, the assembler creates a role-link element:
<security-role-ref> <description>Hints provided by developer to map role-name to role-link</description> <role-name>Mgr</role-name> <role-link>Manager</role-link> </security-role-ref>You can add programmatic EJB component
public class aSessionBean implements SessionBean { ..... // SessionContext extends EJBContext. If it is entity bean use EntityContext javax.ejb.SessionContext context; // The following method will be called by the EJB container // automatically public void setSessionContext(javax.ejb.SessionContext ctx) { context = ctx; // save the session bean's context } .... private void aBusinessMethod() { .... // to get bean's caller using getCallerPrincipal() java.security.Principal principal = context.getCallerPrincipal(); String callerId= principal.getName(); // to check if bean's caller is granted Mgr role boolean isMgr = context.isCallerInRole("Mgr"); // use the above information in any way as needed by the //application .... } .... }
Related reference
Security: Resources for learning