Add new attachment

Only authorized users are allowed to upload new attachments.

This page (revision-93) was last changed on 06-Aug-2010 19:51 by  

This page was created on 17-Jul-2003 19:56 by Ebu

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Difference between version and

At line 1 changed 2 lines
%%(color:red; border: 1px solid inset; background:silver; padding: 8px; font-size: 120%;)
Please note that this page is good for the current auth scheme in 2.2.x. For the latest alpha or CVS version, please see [Security2.3].
Obsolete. Check out the [Security2.3Howto].
At line 4 changed 2 lines
This page is here for historical curiosity only, and will be removed shortly. It does not work. I repeat, it does not work. Do not report bugs. Do not use. Do not even think about using.
The article ["Introduction to JSPWiki"|] in Linux Gazette has a link to this page, so it should be preserved with links to the current security/authentication system.
At line 7 removed 3 lines
''Authentication'' is the process of logging in, and making sure that the user actually is who he says he is.
''Authorization'', or access control, defines the rights and permissions of users, be they unauthenticated guests or known and authenticated individuals.
While the two are separate problems from an architecture perspective, an administrator usually considers them jointly. Thus, this combined status and instruction page.
At line 11 removed 4 lines
User authentication and authorization works; groups don't. Only the three default groups ''Guest'', ''~NamedGuest'', and ''~KnownPerson'' are currently usable.
JSPWiki developers are invited to collect their observations on the Auth* scheme on [Authorization and Authentication Development].
At line 17 changed 375 lines
!!Setting up user authentication
Add the following properties to '''':
jspwiki.authenticator = FileAuthenticator
jspwiki.fileAuthenticator.fileName = /tmp/passwords.txt
# Add the following line authorize all users
jspwiki.policy.strictLogins = true
Edit the password file:
# The format is simply username = password
# No encryption is used currently.
# Comments are allowed; prepend with hash.
ebu = foobar
ubi = frobozz
Restart the container, and access the main page. If you use the default [template|JSP Wiki Templates], a small login box should appear in the left margin. Enter the username in the upper box and the password in the lower, and click on login. If you see the friendly greeting, you have authenticated successfully.
''~FileAuthenticator'' is a fairly simple class (''com.ecyrd.jspwiki.auth.modules.~FileAuthenticator''). You can write your own class to implement ''com.ecyrd.jspwiki.auth.~WikiAuthenticator'', make sure the webapp can find the class, and use the full class name for the ''jspwiki.authenticator'' property to do your own, custom authentication.
!!About Groups
Group support is not finished at this time. Three system groups are defined:
* anyone accessing the wiki belongs to group ''Guest''
* anyone who has set their name on the user preferences page belongs to group ''~NamedGuest''
* anyone who has been authenticated belongs to group ''~KnownPerson''
In the future, the default method to create a group Xyzzy with members Foo and Bar is to
* create a page called ''Xyzzy''
* on the page, add the statement [[{SET members='Foo, Bar'}]
Naturally, a custom can be substituted, if you wish to look group information up in
some other manner.
Groups actually work if you don't use the prospective default implementation (''~WikiDatabase'') that uses WikiPages for group definition.
[I|ebu] wrote a minor patch to ''~UserManager'', now available in the CVS HEAD. You can now define the property ''jspwiki.userdatabase ='' and plug in a ''com.ecyrd.jspwiki.auth.~UserDatabase'' implementation. Again, this is a fairly simple operation, but expect to adjust for [Janne|JanneJalkanen]'s changes before any version releases.
!Page Access Rules
Plugin-like entries on a page define the access level of users. The following examples illustrate the syntax:
A publicly viewable page (since everyone belongs to group ''Guest'', editable only by users ebu and ubi:
[{ALLOW view Guest}]
[{DENY edit Guest}]
[{ALLOW edit ebu, ubi}]
A page viewable by ebu and ubi only, editable by ebu only:
[{DENY view Guest}]
[{ALLOW view ebu, ubi}]
[{DENY edit Guest}]
[{ALLOW edit ebu}]
As can be seen from the parameters, both usernames and group names can be specified in access rules. (We just can't specify new groups quite yet.) Note that ''edit'' does not imply ''view'', and that the order of inclusion-exclusion does not matter. Positive permission takes precedence.
!Default Access Rules
Theoretically, creating a page named ''~DefaultPermissions'' and placing a set of access rules on it should make those rules apply to all pages. Page-specific access rules should replace the defaults, if present. ''However'', the default system does not seem to work properly, and is liable to change (at least into a more configurable form).
__2004.01.11__ ''The format of the ''~DefaultPermissions'' page has changed recently, apparently around version 2.1.104. Check out the description in the ''~DefaultPermissions'' page that is included with the JSPWiki distribution for a good description. In brief, apparently you set a ''defaultpermissions'' variable now within the ''~DefaultPermissions'' page. And this appears to have some limitiations as of 2.1.134 such as making changes to ''defaultpermissions'' aren't recognized until you restart.'' -- Mock.
Administrators are people who are allowed to do whatever they please in the wiki system. No access rights stop them.
You can set the name of the administrator group by setting the {{jspwiki.auth.administrator}} - property in your For example:
jspwiki.auth.administrator = WikiAdmin
The default value for the admin group is "WikiAdmin".
On the group page you would then list those people who are a part of this group. For example, to make ~JackJones and ~JillJones administrators, use:
[{SET members='JackJones, JillJones'}]
!Using Spring's Acegi security framework
Is it possible to integrate JSPWiki into an existing Spring application secured by Acegi Security? What I want to achieve is a kind of single sign for my Spring Application (Acegi, MD5+salt passwords, User/Password stored in database) and JSPWiki.
I guess I've to integrate JSPWiki into my webapp. Are there any Tips/Tricks howto achieve the best result? Do I have to write my UserDatabase class?
Thanks a lot. ThomasBecker
!Multiple Wiki Site Security
Hmm, any indications on how security and such can be setup and administered on say a wiki installation of 8 wiki's with about 20 users? Am I going to have massive duplication and have to manually synch stuff between the wiki's? Any way to setup a master security configuration and have it propagate thru each wiki? (Tangentially related to my SecurityHelp question.) --JohnV
User/password databases can be shared. The default PageAuthorizer finds its permissions on the WikiPages themselves. --JanneJalkanen
Bear with me as all of this is new stuff. I've got a mix of unsecured and secured wikis; right now there's duplication all over the place, so I'm using [MultipleWikis] to help simplify things. The problem is that authentication is currently handled via container managed security, so secured wikis have different web.xmls that define which roles are allowed access. Is there any elegant way of handling this scenario? --[KyleAdams]
I extended JSPWiki to allow "/" in the page-names (but any other character might do it too) and wrote my own Filter (to be configured in web.xml not the new jspwiki-filters) - this will read a jspwiki page called "ACL".\\
Now the first token (pagename splitted by "/") of a wiki-pagename can be secured.\\
e.g. consider the pages "public/AnyInformation" and "private/MyInformation".\\
Within the "ACL" page I configured which role a user have to belong to to view/edit the private/ page.
The ACL page can be edited through jspwiki and the roles are checked against the container-security.\\
For sure a very specific implementation, but maybe you can pickup the idea to use filters to secure things.
!Limitting Access to Wiki to Particular Users
How do i make it so only certain users can get access to the wiki
at all? When i deny guest view priviledges i get a loop error in
when access in the wiki. Allowing guest to view fixes this, but
it also means guests can view pages and i don't want them to.
Create a page named LoginError and give Guest view permissions on it.
Thanks but can you explain what this accomplishes?
That accomplishes the behaviour you are looking for. In that case you can globally deny view from Guest and they will get a nice explanation saying why they cannot see anything.
! Container Managed Security
How do you integrate Container Managed Security with JspWiki 2.2 Authentication/Authorization?\\
(I am not sure why everyone wants to create yet another set of usernames/passwords/security problems, etc.)\\
I turn on the security constraint in the web.xml. When a WikiPage has a page access rule set, it throws a login error and takes you to the login page. However the login page doesn't work with container managed security. So you can never login. That is, unless you set up a separate JspWiki authorization scheme like FileAuthenticator. So you end up with two competing authorization schemes.
* For howto secure web applications in JBoss see [SecureTheJmxConsole|]. I've done the same for JspWiki and it's really easy. -- JJarkko
;:''uhhh... and that's relevant how? I am not asking how to secure a web application in JBoss and I can already lock JspWiki 2.0 down using contain manager security but that's not anything integrated into the 2.2 authorization scheme (AFAIK). I am asking something specific about JspWiki 2.2 Authentication/Authorization. It would appear that it requires writing a JspWiki authentication plugin, which I haven't look into yet, in order to avoid yet another place for user names and passwords. Although, it seems so basic to me that it should be included as well as be default authentication scheme. And maybe it already works, so that's why I am asking before I go off and write something. If I misunderstand and you have actually written the plugin already then please share it.''
* Hmm, let me try to explain things ;) If you secure your application according to the above link you get both Authentication and data needed for Authorization for the current user from the container (basic J2EE Servlet stuff). Then you can ask from the servlet container if the user has the specified role by using the [HttpServletRequest.isUserInRole|] and thus allow access if the user has the required role,as defined with the ALLOW method above, or disallow access in the case of DENY. Name of the authenticated user is available from [request.getUserPrincipal|]. IMHO the application doesn't have to know anything about where the login-user-name or his/hers role/group information came from. The only problem with CMS is that you need to use tools specific to the container/server to setup users,passwords and group information. Which isn't a problem if you just choose your backend carefully enough (e.g. database with simple schema or use LDAP). There's also [securityfilter|] project which tries to mimic container manager security. I don't know if it's any use but the site contains some information and discussion about J2EE/JSP/Servlet security related stuff. I haven't written any plugins for JspWiki, i've just found it and i'm very happy! ;) --jjarkko
* I think the requirement is really for a Container manager adapter for 2.2 auth model. Someone would need to write it - any volunteers? --JanneJalkanen
* Look at [Container Managed Security] for a brief overview, and look at [Auth Plugin] for how I did it. I'll clean the code up and post it for you all to marvel at what a hack programmer I really am -- [FosterSchucker]
* I am also interessed in using JSPWiki with CMS but it does not seem to be consistenly implemented in all containers. Tomcat provides a principal if the user once is authenticated. JBoss only provides the principal for pages in the secured context. I found something about this problem here: [] -- [MDeichsel]
!Default Access Rules
Since the page for default access rules applies to all pages, how do you set the access rules for the default access rules page. I want it so only WikiAdmin users can change the default access rules but since my default access rules are,
[{ALLOW view Guest}]
[{ALLOW edit NamedGuest}]
[{DENY edit Guest}]
, anyone can edit the page and change them that is a NamedGuest. I do not know how to secure only the DefaultPermissions page. Someone on my wiki keeps changing the default permissions. I want to keep them set. Possible? --JPS
--Fixed in JSPWiki v2.1.104. Thanks alot. It works great. --JPS
! Hide Edit This Page
Is it possible to only show the Edit This Page etc when the user is a ''~KnownPerson''? - Shelbie
The following:
<wiki:UserCheck exists="true">
<wiki:EditLink page="LeftMenu">Edit This Menu</wiki:EditLink>
will do what you want. (this code snippit is found in LeftMenu.jsp in the template directory).
UserCheck also accepts "false", this lets you do:
<wiki:UserCheck exists="true">
<wiki:Translate>[<wiki:UserName />]</wiki:Translate>
<wiki:UserCheck exists="false">
Please set your name in the<br />
<wiki:LinkTo page="UserPreferences">UserPreferences</wiki:LinkTo>
(also from LeftMenu.jsp) -- [Foster Schucker]
I am sorry, but I have jspwiki version 2.2.28 under tomcat and this is not working for me. My current setup is completely open - anyone can view and edit any page. I would like to change it so that
* for most people and pages, it continues to work the same way and
* from some pages, view and edit access are restricted to certain logged in persons only.
My questions are:
* Do I need to make some changes to Tomcat itself or can this be accomplished in JSPWiki itself?
* I made the changes in and restarted it, but I don't see a login box anywhere. What other steps am I missing?
* UPDATE: I also tried creating a DefaultPermissions page, but that doesn't help either.
It would be nice if there were a page with exactly the steps to do in order to turn on authentication. Thanks.
-- SriramGopalan
I followed the changes to the properties file and added a file with the users. Still does not work... allows anyone to edit...
So I guess we are having the problesm... anyone's help will be appreaciated -- Greg
Old discussion: [Requirements for JSPWiki Authentication]
[Category Development] - to be moved to Documentation once auth* is ready.
<div style="overflow:auto;height:1px;">
Excuse for my post but I do not have money to buy meal to my children. Forgive me please.
[ college sex for books]
[ federal job in south carolina]
[ college sex interracial]
[ wastewater treatment plant operator jobs]
[ college sex parties]
[ dog bite attorney]
[ college sex photos]
[ free adult games online]
[ spirit air]
[ dog generatot]
[ auto wholesalers]
[ olympia college in il]
[ park house north manchester general nhs staff nurse job description]
[ college shooting statistics]
[ nude lesbian sex]
[ donkey kong country cheats]
[ car care council]
[ nitro remote control gas car]
[ signs of dog pregnancy]
[ lyons il real estate]
[ college site money adult student]
[ new music lyric]
[ agnes scott college gaines auditorium]
[ college sites]
[ college size]
[ college slackers]
[ real estate listings las vegas]
[ mopar race car]
[ asian girl g string]
[ accent furniture cabinet]
[ stranraer football club]
[ mother nature home remedies]
[ easter air forces]
[ work at home sewing no registration fee]
[ air force ones wholesale]
[ daddys girl]
[ sheet music too much dave mrthews]
[ jobs washington dc]
[ japan airline cheapest lowest airfares]
[ college softball polls]
[ hotels that excepts small dogs in middlesex county newjersey]
[ columbiana dog pound]
[ college softball spring training in tuscon arizona]
[ free thumbnail links adult porn]
[ shane movie music]
[ contemporary home office]
[ gay pissing videos]
[ auto mechanic history]
[ which college did maya angelou attend]
[ pornholio game]
[ north carolina dog training house bill]
[ college sorority girls]
[ quency air compresser]
[ anima games]
[ elders real estate dickson a c t ]
[ jobs for purchasing assisstants]
[ arapahoe community college littleton co]
[ estate agents herts]
[ words to girl next door]
[ car stereo speakers]
[ airline power adapter for macbookpro]
[ shakey dog ghostface ]
[ home made helicopters]
[ free job evaluation forms]
[ kenmore air filters]
[ college sport magazines]
[ very hairy girl]
[ simple science experiments at home edu]
[ college sports merchandise]
[ who invented punk music ]
[ shorncliffe hotels]
[ college sports recruiting]
[ free leonard cohen hallelujah music]
[ easy jobs]
[ dress up under car hood]
[ ring girl competition music]
[ best value car hire auckland zealand]
[ villa music puerto rico]
[ jefferson community college ny]
[ car rentalk]
[ used car dealerships in mi]
[ college spring break trips]
[ macon state college]
[ 100 home financing]
[ college springs meta tags]
[ kids book cheats]
[ best home office furniture web sites]
[ sex yer]
[ sindhi music sindhi songs]
[ college squares]
[ smart car build]
[ college stadium capicity]
[ car loan minnesota title]
[ colorado springs downtown real estate]
[ d24tic air intake]
[ fun adult videos]
[ snail mail free dowload game]
[ creative car audio]
[ accessory car snooper performance product snooper r snooper sr5 nav sat snooper snoopersrus co uk]
[ naked anime girls]
[ park air millennium view attachment]
[ news about winners home sense]
[ college graduate gift ideas]
[ sex in suburbia dvd]
[ dorian music]
[ neopets html backround codes]
[ vinyl auto graphics]
[ college station phone book]
[ service dog patches]
[ verizon music choice]
[ blonde models nude hand job movies]
[ free free free all free games online]
[ college station texas]
[ auto body shop]
[ car exotic girl]
[ college station zambia mission trip]
[ texas education jobs]
[ estate beneficiary rights]
[ fanshawe college]
[ elizabethan games and entertainment]
[ lovettsville virginia real estate]
[ http frontwindow onychic be doubledoor html]
[ air brake p arts]
[ mortal kombat games online]
[ college stories wild sex]
[ summer job opportunities maryland]
[ sirius stc2 car kit]
[ bank manager job description]
[ children pc video games made for 19901999]
[ college strength conditioning coach]
[ crystal river real estate]
[ does air have to have mass]
[ brower real estate]
[ hand carved furniture mizner style]
[ refinance mortgage calculator home purchase prequalify southfloridalenders net]
[ graphic clipart of cats and dogs]
[ honda car club aberdeen]
[ eindhoven hotels]
[ derby jobs]
[ middlesex county college spring 2006 phi theta kappa diane wesnowsky]
[ marriage men lose interest andnot sex]
[ online music subscription]
[ old money cheats for roller coaster tycoon]
[ final fantasy opera music lyric]
[ home depot financial report]
[ all inclusive discount resort and air]
[ real bacon dog treats]
[ commercial real estate washington state]
[ st louis hotels downtown]
[ burke v air france]
I was surprised to find this page deleted. I understand that the new security model is far better than this one; however, so long as v2.2.33 remains your "Current stable release" and 2.3.x / 2.4.x remain betas, you should keep the documentation for 2.2.33 available. All 3 of your security pages were properly marked at the top with the version numbers they applied to and I think that was the right way to do it. (I managed to diff version 79 and 80, grab the mark-up and copy it my Wiki (intranet, sorry) so I'm OK but for other
Version Date Modified Size Author Changes ... Change note
93 06-Aug-2010 19:51 0.804 kB to previous
92 12-Oct-2007 06:41 1.496 kB JanneJalkanen to previous | to last
91 11-Oct-2007 23:45 1.513 kB to previous | to last
90 26-Sep-2007 23:40 1.496 kB JanneJalkanen to previous | to last
89 26-Sep-2007 02:46 1.527 kB to previous | to last
88 26-Sep-2007 02:45 1.518 kB to previous | to last
87 25-Sep-2007 23:36 1.505 kB to previous | to last
86 30-Aug-2007 03:06 1.496 kB to previous | to last
85 05-Aug-2006 12:06 1.105 kB Janne Jalkanen to previous | to last
84 02-Aug-2006 17:25 0.938 kB Martin Hache to previous | to last
83 11-Jul-2006 17:12 0.257 kB to previous | to last
82 11-Jul-2006 16:31 0.057 kB to previous | to last
81 11-Jul-2006 16:30 0.052 kB to previous | to last
« This page (revision-93) was last changed on 06-Aug-2010 19:51 by