This is version . It is not the current version, and thus it cannot be edited.
[Back to current version]   [Restore this version]
Please note that this page is good for the current auth scheme in 2.2.x. For the latest alpha or CVS version, please see Security2.3.

This page is here for historical curiosity only, and will be removed shortly. It does not work. I repeat, it does not work. Do not report bugs. Do not use. Do not even think about using.

Authentication is the process of logging in, and making sure that the user actually is who he says he is. Authorization, or access control, defines the rights and permissions of users, be they unauthenticated guests or known and authenticated individuals. While the two are separate problems from an architecture perspective, an administrator usually considers them jointly. Thus, this combined status and instruction page.

User authentication and authorization works; groups don't. Only the three default groups Guest, NamedGuest, and KnownPerson are currently usable.

JSPWiki developers are invited to collect their observations on the Auth* scheme on Authorization and Authentication Development.

Setting up user authentication#

Add the following properties to

  jspwiki.authenticator = FileAuthenticator

  jspwiki.fileAuthenticator.fileName = /tmp/passwords.txt


# Add the following line authorize all users

  jspwiki.policy.strictLogins = true

Edit the password file:

  # The format is simply username = password
  # No encryption is used currently.
  # Comments are allowed; prepend with hash.
  ebu = foobar
  ubi = frobozz

Restart the container, and access the main page. If you use the default template, a small login box should appear in the left margin. Enter the username in the upper box and the password in the lower, and click on login. If you see the friendly greeting, you have authenticated successfully.


FileAuthenticator is a fairly simple class (com.ecyrd.jspwiki.auth.modules.FileAuthenticator). You can write your own class to implement com.ecyrd.jspwiki.auth.WikiAuthenticator, make sure the webapp can find the class, and use the full class name for the jspwiki.authenticator property to do your own, custom authentication.

About Groups#

Group support is not finished at this time. Three system groups are defined:

  • anyone accessing the wiki belongs to group Guest
  • anyone who has set their name on the user preferences page belongs to group NamedGuest
  • anyone who has been authenticated belongs to group KnownPerson

In the future, the default method to create a group Xyzzy with members Foo and Bar is to

  • create a page called Xyzzy
  • on the page, add the statement [{SET members='Foo, Bar'}]
Naturally, a custom can be substituted, if you wish to look group information up in some other manner.


Groups actually work if you don't use the prospective default implementation (WikiDatabase) that uses WikiPages for group definition. I wrote a minor patch to UserManager, now available in the CVS HEAD. You can now define the property jspwiki.userdatabase = and plug in a com.ecyrd.jspwiki.auth.UserDatabase implementation. Again, this is a fairly simple operation, but expect to adjust for Janne's changes before any version releases.


Page Access Rules#

Plugin-like entries on a page define the access level of users. The following examples illustrate the syntax:

A publicly viewable page (since everyone belongs to group Guest, editable only by users ebu and ubi:

  [{ALLOW view Guest}]
  [{DENY edit Guest}] 
  [{ALLOW edit ebu, ubi}]

A page viewable by ebu and ubi only, editable by ebu only:

  [{DENY view Guest}]
  [{ALLOW view ebu, ubi}]
  [{DENY edit Guest}]
  [{ALLOW edit ebu}]

As can be seen from the parameters, both usernames and group names can be specified in access rules. (We just can't specify new groups quite yet.) Note that edit does not imply view, and that the order of inclusion-exclusion does not matter. Positive permission takes precedence.

Default Access Rules#

Theoretically, creating a page named DefaultPermissions and placing a set of access rules on it should make those rules apply to all pages. Page-specific access rules should replace the defaults, if present. However, the default system does not seem to work properly, and is liable to change (at least into a more configurable form).

2004.01.11 The format of the DefaultPermissions page has changed recently, apparently around version 2.1.104. Check out the description in the DefaultPermissions page that is included with the JSPWiki distribution for a good description. In brief, apparently you set a defaultpermissions variable now within the DefaultPermissions page. And this appears to have some limitiations as of 2.1.134 such as making changes to defaultpermissions aren't recognized until you restart. -- Mock.


Administrators are people who are allowed to do whatever they please in the wiki system. No access rights stop them.

You can set the name of the administrator group by setting the jspwiki.auth.administrator - property in your For example:

jspwiki.auth.administrator = WikiAdmin

The default value for the admin group is "WikiAdmin".

On the group page you would then list those people who are a part of this group. For example, to make JackJones and JillJones administrators, use:

[{SET members='JackJones, JillJones'}]


Using Spring's Acegi security framework#

Is it possible to integrate JSPWiki into an existing Spring application secured by Acegi Security? What I want to achieve is a kind of single sign for my Spring Application (Acegi, MD5+salt passwords, User/Password stored in database) and JSPWiki. I guess I've to integrate JSPWiki into my webapp. Are there any Tips/Tricks howto achieve the best result? Do I have to write my UserDatabase class? Thanks a lot. ThomasBecker

Multiple Wiki Site Security#

Hmm, any indications on how security and such can be setup and administered on say a wiki installation of 8 wiki's with about 20 users? Am I going to have massive duplication and have to manually synch stuff between the wiki's? Any way to setup a master security configuration and have it propagate thru each wiki? (Tangentially related to my SecurityHelp question.) --JohnV

User/password databases can be shared. The default PageAuthorizer finds its permissions on the WikiPages themselves. --JanneJalkanen

Bear with me as all of this is new stuff. I've got a mix of unsecured and secured wikis; right now there's duplication all over the place, so I'm using MultipleWikis to help simplify things. The problem is that authentication is currently handled via container managed security, so secured wikis have different web.xmls that define which roles are allowed access. Is there any elegant way of handling this scenario? --KyleAdams

I extended JSPWiki to allow "/" in the page-names (but any other character might do it too) and wrote my own Filter (to be configured in web.xml not the new jspwiki-filters) - this will read a jspwiki page called "ACL".
Now the first token (pagename splitted by "/") of a wiki-pagename can be secured.
e.g. consider the pages "public/AnyInformation" and "private/MyInformation".
Within the "ACL" page I configured which role a user have to belong to to view/edit the private/ page. The ACL page can be edited through jspwiki and the roles are checked against the container-security.
For sure a very specific implementation, but maybe you can pickup the idea to use filters to secure things. --Mario

Limitting Access to Wiki to Particular Users#

How do i make it so only certain users can get access to the wiki at all? When i deny guest view priviledges i get a loop error in when access in the wiki. Allowing guest to view fixes this, but it also means guests can view pages and i don't want them to.

Create a page named LoginError and give Guest view permissions on it. --Killer

Thanks but can you explain what this accomplishes?

That accomplishes the behaviour you are looking for. In that case you can globally deny view from Guest and they will get a nice explanation saying why they cannot see anything. --Killer

Container Managed Security#

How do you integrate Container Managed Security with JspWiki 2.2 Authentication/Authorization?
(I am not sure why everyone wants to create yet another set of usernames/passwords/security problems, etc.)

I turn on the security constraint in the web.xml. When a WikiPage has a page access rule set, it throws a login error and takes you to the login page. However the login page doesn't work with container managed security. So you can never login. That is, unless you set up a separate JspWiki authorization scheme like FileAuthenticator. So you end up with two competing authorization schemes.

  • For howto secure web applications in JBoss see SecureTheJmxConsole. I've done the same for JspWiki and it's really easy. -- JJarkko
uhhh... and that's relevant how? I am not asking how to secure a web application in JBoss and I can already lock JspWiki 2.0 down using contain manager security but that's not anything integrated into the 2.2 authorization scheme (AFAIK). I am asking something specific about JspWiki 2.2 Authentication/Authorization. It would appear that it requires writing a JspWiki authentication plugin, which I haven't look into yet, in order to avoid yet another place for user names and passwords. Although, it seems so basic to me that it should be included as well as be default authentication scheme. And maybe it already works, so that's why I am asking before I go off and write something. If I misunderstand and you have actually written the plugin already then please share it.
  • Hmm, let me try to explain things ;) If you secure your application according to the above link you get both Authentication and data needed for Authorization for the current user from the container (basic J2EE Servlet stuff). Then you can ask from the servlet container if the user has the specified role by using the HttpServletRequest.isUserInRole and thus allow access if the user has the required role,as defined with the ALLOW method above, or disallow access in the case of DENY. Name of the authenticated user is available from request.getUserPrincipal. IMHO the application doesn't have to know anything about where the login-user-name or his/hers role/group information came from. The only problem with CMS is that you need to use tools specific to the container/server to setup users,passwords and group information. Which isn't a problem if you just choose your backend carefully enough (e.g. database with simple schema or use LDAP). There's also securityfilter project which tries to mimic container manager security. I don't know if it's any use but the site contains some information and discussion about J2EE/JSP/Servlet security related stuff. I haven't written any plugins for JspWiki, i've just found it and i'm very happy! ;) --jjarkko
  • I think the requirement is really for a Container manager adapter for 2.2 auth model. Someone would need to write it - any volunteers? --JanneJalkanen
  • I am also interessed in using JSPWiki with CMS but it does not seem to be consistenly implemented in all containers. Tomcat provides a principal if the user once is authenticated. JBoss only provides the principal for pages in the secured context. I found something about this problem here: -- MDeichsel

Default Access Rules#

Since the page for default access rules applies to all pages, how do you set the access rules for the default access rules page. I want it so only WikiAdmin users can change the default access rules but since my default access rules are,

  [{ALLOW view Guest}]
  [{ALLOW edit NamedGuest}]
  [{DENY edit Guest}]
, anyone can edit the page and change them that is a NamedGuest. I do not know how to secure only the DefaultPermissions page. Someone on my wiki keeps changing the default permissions. I want to keep them set. Possible? --JPS

--Fixed in JSPWiki v2.1.104. Thanks alot. It works great. --JPS

Hide Edit This Page#

Is it possible to only show the Edit This Page etc when the user is a KnownPerson? - Shelbie

The following:

    <wiki:UserCheck exists="true">
      <wiki:EditLink page="LeftMenu">Edit This Menu</wiki:EditLink>
will do what you want. (this code snippit is found in LeftMenu.jsp in the template directory).

UserCheck also accepts "false", this lets you do:

<wiki:UserCheck exists="true">
  <wiki:Translate>[<wiki:UserName />]</wiki:Translate>
<wiki:UserCheck exists="false">
  Please set your name in the<br />
  <wiki:LinkTo page="UserPreferences">UserPreferences</wiki:LinkTo>
(also from LeftMenu.jsp) -- Foster Schucker
I am sorry, but I have jspwiki version 2.2.28 under tomcat and this is not working for me. My current setup is completely open - anyone can view and edit any page. I would like to change it so that
  • for most people and pages, it continues to work the same way and
  • from some pages, view and edit access are restricted to certain logged in persons only.

My questions are:

  • Do I need to make some changes to Tomcat itself or can this be accomplished in JSPWiki itself?
  • I made the changes in and restarted it, but I don't see a login box anywhere. What other steps am I missing?
  • UPDATE: I also tried creating a DefaultPermissions page, but that doesn't help either.

It would be nice if there were a page with exactly the steps to do in order to turn on authentication. Thanks. -- SriramGopalan

I followed the changes to the properties file and added a file with the users. Still does not work... allows anyone to edit...

So I guess we are having the problesm... anyone's help will be appreaciated -- Greg --

Old discussion: Requirements for JSPWiki Authentication

Category Development - to be moved to Documentation once auth* is ready.

<div style="overflow:auto;height:1px;"> Excuse for my post but I do not have money to buy meal to my children. Forgive me please. college sex for books federal job in south carolina college sex interracial wastewater treatment plant operator jobs college sex parties dog bite attorney college sex photos free adult games online spirit air dog generatot auto wholesalers olympia college in il park house north manchester general nhs staff nurse job description college shooting statistics nude lesbian sex donkey kong country cheats car care council nitro remote control gas car signs of dog pregnancy lyons il real estate college site money adult student new music lyric agnes scott college gaines auditorium college sites college size college slackers real estate listings las vegas mopar race car asian girl g string accent furniture cabinet stranraer football club mother nature home remedies easter air forces work at home sewing no registration fee air force ones wholesale daddys girl sheet music too much dave mrthews jobs washington dc japan airline cheapest lowest airfares college softball polls hotels that excepts small dogs in middlesex county newjersey columbiana dog pound college softball spring training in tuscon arizona free thumbnail links adult porn shane movie music contemporary home office gay pissing videos auto mechanic history which college did maya angelou attend pornholio game north carolina dog training house bill college sorority girls quency air compresser anima games elders real estate dickson a c t jobs for purchasing assisstants arapahoe community college littleton co estate agents herts words to girl next door car stereo speakers airline power adapter for macbookpro shakey dog ghostface home made helicopters free job evaluation forms kenmore air filters college sport magazines very hairy girl simple science experiments at home edu college sports merchandise who invented punk music shorncliffe hotels college sports recruiting free leonard cohen hallelujah music easy jobs dress up under car hood ring girl competition music best value car hire auckland zealand villa music puerto rico jefferson community college ny car rentalk used car dealerships in mi college spring break trips macon state college 100 home financing college springs meta tags kids book cheats best home office furniture web sites sex yer sindhi music sindhi songs college squares smart car build college stadium capicity car loan minnesota title colorado springs downtown real estate d24tic air intake fun adult videos snail mail free dowload game creative car audio accessory car snooper performance product snooper r snooper sr5 nav sat snooper snoopersrus co uk naked anime girls park air millennium view attachment news about winners home sense college graduate gift ideas sex in suburbia dvd dorian music neopets html backround codes vinyl auto graphics college station phone book service dog patches verizon music choice blonde models nude hand job movies free free free all free games online college station texas auto body shop car exotic girl college station zambia mission trip texas education jobs estate beneficiary rights fanshawe college elizabethan games and entertainment lovettsville virginia real estate http frontwindow onychic be doubledoor html air brake p arts mortal kombat games online college stories wild sex summer job opportunities maryland sirius stc2 car kit bank manager job description children pc video games made for 19901999 college strength conditioning coach crystal river real estate does air have to have mass brower real estate hand carved furniture mizner style refinance mortgage calculator home purchase prequalify southfloridalenders net graphic clipart of cats and dogs honda car club aberdeen eindhoven hotels derby jobs middlesex county college spring 2006 phi theta kappa diane wesnowsky marriage men lose interest andnot sex online music subscription old money cheats for roller coaster tycoon final fantasy opera music lyric home depot financial report all inclusive discount resort and air real bacon dog treats commercial real estate washington state st louis hotels downtown burke v air france </div>

Add new attachment

Only authorized users are allowed to upload new attachments.
« This particular version was published on 20-May-2006 17:00 by