
By Duncan Mills, Frank Nimphius | Article Rating: |
|
August 10, 2006 05:15 PM EDT | Reads: |
91,438 |

Application security - the art of applications defending themselves - represents an important line of defence in an overall in-depth security strategy. Web applications that follow the Model-View-Controller (MVC) architecture can, and should, have security implemented on all three layers. Normally it's the controller component that handles page authorization in MVC, the view layer that hides controls and information based on user authorization, and the model that enforces the business rules and input validation. However, it's up to the developer, based on an individual security policy and the programming technology used, to decide where to put security. Using pluggable validator components in JavaServer Faces (JSF), for example, developers may decide to verify user input on the view layer as well as on the model layer.
JavaServer Faces, the new J2EE standard for building feature-rich Web applications with JEE 1.5, has few integrated security features. JSF generously delegates the task of implementing application security such as page authorization to the application developer, leaving many developers pondering where to start, where best to put security, and which security technology to choose.
This article aims to answer such questions for authorization in JavaServer Faces, demonstrating how a custom PhaseListener that uses J2EE container-managed security can be used to implement access control for JSF pages. Besides page authorization, the security PhaseListener supports protocol switching between HTTP and HTTPS, a common requirement of applications that work with sensitive data on a Web page.
The J2EE Security Choices
The J2EE platform provides two built-in security technologies for the application developer to use: the Java Authentication and Authorization Service (JAAS) and container-managed security, also known as J2EE security.
The Java Authentication and Authorization Service is a J2SE 1.4 security standard designed for the Java desktop that's also used as an implementation technology for security in J2EE. The JAAS authentication infrastructure is built as a Java version of the Pluggable Authentication Module (PAM) architecture that allows one or more authentication providers to be used for user identification. Before JAAS, the Java 2 security platform was code-centric, determining access privileges based solely on the location of the Java sources. Using JAAS, Java security now also looks at the authenticated user when evaluating access control to resources. JAAS's benefit is its ability to implement fine-grained access control through external Java permission classes, which associate users with a list of resources and allowed actions.
Authentication and authorization in J2EE security is configured declaratively in the application's web.xml deployment descriptor and handled by the J2EE container at runtime. Working with APIs defined in the J2EE servlet standard, application developers don't have to worry about the implementation of security in a container. In container-managed security, authorization is enforced on URL patterns, which are absolute or relative URLs. This however also means that authorization is only enforced on requests that are initiated by the client, not as server-side forward requests.
Ease of use, the clean separation of security definition and application code, and portability across application servers are the main reasons for the wide adoption of container-managed security among business application developers. J2EE security is sufficient to implement many common security use cases. As a reflection of its popularity and its portability, container-managed security is used in the code examples of this article to illustrate effective page authorization in JavaServer Faces.
Container-Managed Security in J2EE
In container-managed security, a user is granted access to protected URL resources through security roles defined in the web.xml deployment descriptor. Security roles in J2EE are logical names used in Web applications that are mapped during or after deployment to user groups that exist on the target application server platform.
Listing 1 Web.xml excerpt granting the app_user security role access to the protected URL resource /faces/protected/*
<security-constraint>
<Web-resource-collection>
<Web-resource-name>Members</Web-resource-name>
<url-pattern>/faces/protected/*</url-pattern>
</Web-resource-collection>
<auth-constraint>
<role-name>app_user</role-name>
</auth-constraint>
</security-constraint>
...
<security-role>
<role-name>app_user</role-name>
</security-role>
To access a protected application resource, Web application users must first authenticate, which in container-managed security is handled by the J2EE container. Either the application developer or the application deployer configures the type of authentication in the web.xml deployment descriptor.
Listing 2 Basic authentication defined for the jazn.com realm
<login-config>
<auth-method>BASIC</auth-method>
<realm-name>jazn.com</realm-name>
</login-config>
To check authorization programmatically in an J2EE application - like in JavaServer Faces - application developers use the isUserInRole method in the servlet API. This isUserInRole method is also exposed via a convenience method in JavaServer Faces through the static FacesContext class. Role names referenced in application code ought to be mapped to roles defined in the web.xml file using the <security-role-ref> element if the role names don't match. Using the <security-role-ref> element, developers don't have to be aware of the security role names that exist in the web.xml descriptor when developing an application.
Listing 3 Mapping the "user" role name used in the application code to the security role name "manager_role" defined in the web.xml file
<security-role-ref>
<role-name>user</role-name>
<role-link>app_user</role-link>
</security-role-ref>
If the authenticated user isn't authorized to access the requested URL resource, the J2EE container responds with HTTP error 403, indicating a bad request. A HTTP error 401 is returned if a user cancels the authentication process. HTTP error codes and Java exceptions are handled declaratively in the web.xml file using the <error-page> element.
Listing 4 Redirecting a request in response to unauthorized page access handling error code 403 and 401
<error-page>
<error-code>403</error-code>
<location>Error.jsp</location>
</error-page>
<error-page>
<error-code>401</error-code>
<location>Logon_cancelled.jsp</location>
</error-page>
If SSL is required to ensure secure communication when accessing a specific Web resource, the <security-constraint> element added for a protected resource contains an additional <user-data-constraint> element. Setting the transport guarantee to "confidential" indicates that SSL is required.
Published August 10, 2006 Reads 91,438
Copyright © 2006 SYS-CON Media, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
More Stories By Duncan Mills
Duncan Mills is senior director of product management for Oracle's Application Development Tools - including the JDeveloper IDE, and the Oracle Application Development Framework. He has been in the IT industry for the past 19 years working with Oracle, Java, and a variety of more obscure programming languages and frameworks along the way. Duncan is the co-author of the Oracle Press book: Oracle JDeveloper 10g for Forms and PL/SQL Developers - a Guide to Web Development with Oracle ADF.
More Stories By Frank Nimphius
Frank Nimphius is a principal product manager for application development tools at Oracle Corporation. As a conference speaker, Frank represents the Oracle J2EE development team at J2EE conferences world wide, including various Oracle user groups and the Oracle Open World conference.
![]() |
y_alomoush 09/01/08 04:29:19 PM EDT | |||
Hi Duncan and Frank, Thanks for your great efforts. It is a job well done. In fact,I have installed the module and plugged it to my own application for evaluation purposes.However, I have found a scenario where a user can access into a unauthorized page, I don't know if I can call it as a bug or not. The scenario is as the following: 3-enter a correct username/password but not authorized to access that page. 3-system shall redirect you to error page using the sendError method. 4-call the same page again (using the same session). the system strangely forward you to the page that you are not authorized to access.(because the page is already cached as an authorized page) I think after the page is redirected to the error page the handleSecurity method must return, in this case, false instead of retuning true, this in order not to cache an unauthorized page. Thank yo once again. |
![]() |
keerthi 09/21/06 10:22:56 AM EDT | |||
Hi Duncan and Frank, This article is really an interesting one. I found it at a right moment of time as I was trying to implement Page level security in a Project based on JSF. |
![]() |
SYS-CON Italy News Desk 08/10/06 05:42:31 PM EDT | |||
Application security - the art of applications defending themselves - represents an important line of defence in an overall in-depth security strategy. Web applications that follow the Model-View-Controller (MVC) architecture can, and should, have security implemented on all three layers. Normally it's the controller component that handles page authorization in MVC, the view layer that hides controls and information based on user authorization, and the model that enforces the business rules and input validation. However, it's up to the developer, based on an individual security policy and the programming technology used, to decide where to put security. Using pluggable validator components in JavaServer Faces (JSF), for example, developers may decide to verify user input on the view layer as well as on the model layer. |
![]() |
AJAXWorld News Desk 08/10/06 05:26:41 PM EDT | |||
Application security - the art of applications defending themselves - represents an important line of defence in an overall in-depth security strategy. Web applications that follow the Model-View-Controller (MVC) architecture can, and should, have security implemented on all three layers. Normally it's the controller component that handles page authorization in MVC, the view layer that hides controls and information based on user authorization, and the model that enforces the business rules and input validation. However, it's up to the developer, based on an individual security policy and the programming technology used, to decide where to put security. Using pluggable validator components in JavaServer Faces (JSF), for example, developers may decide to verify user input on the view layer as well as on the model layer. |
![]() |
JDJ News Desk 07/26/06 05:18:34 PM EDT | |||
Application security - the art of applications defending themselves - represents an important line of defence in an overall in-depth security strategy. Web applications that follow the Model-View-Controller (MVC) architecture can, and should, have security implemented on all three layers. Normally it's the controller component that handles page authorization in MVC, the view layer that hides controls and information based on user authorization, and the model that enforces the business rules and input validation. However, it's up to the developer, based on an individual security policy and the programming technology used, to decide where to put security. Using pluggable validator components in JavaServer Faces (JSF), for example, developers may decide to verify user input on the view layer as well as on the model layer. |
![]() |
JDJ News Desk 07/26/06 04:40:02 PM EDT | |||
Application security - the art of applications defending themselves - represents an important line of defence in an overall in-depth security strategy. Web applications that follow the Model-View-Controller (MVC) architecture can, and should, have security implemented on all three layers. Normally it's the controller component that handles page authorization in MVC, the view layer that hides controls and information based on user authorization, and the model that enforces the business rules and input validation. However, it's up to the developer, based on an individual security policy and the programming technology used, to decide where to put security. Using pluggable validator components in JavaServer Faces (JSF), for example, developers may decide to verify user input on the view layer as well as on the model layer. |
![]() Feb. 8, 2018 07:45 AM EST Reads: 2,893 |
By Yeshim Deniz ![]() Feb. 8, 2018 05:15 AM EST Reads: 2,123 |
By Pat Romanski ![]() Feb. 8, 2018 12:00 AM EST Reads: 9,360 |
By Liz McMillan ![]() Feb. 6, 2018 03:00 PM EST Reads: 2,357 |
By Liz McMillan ![]() Feb. 6, 2018 01:45 PM EST Reads: 2,839 |
By Ram Sonagara ![]() Feb. 1, 2018 06:00 AM EST Reads: 1,038 |
By Elizabeth White ![]() Dec. 31, 2017 12:00 PM EST Reads: 2,693 |
By Pat Romanski ![]() Dec. 30, 2017 11:00 AM EST Reads: 2,483 |
By Pat Romanski ![]() Dec. 30, 2017 08:30 AM EST Reads: 15,421 |
By Liz McMillan ![]() Dec. 29, 2017 12:00 PM EST Reads: 3,548 |
By Liz McMillan ![]() Dec. 29, 2017 08:00 AM EST Reads: 3,747 |
By Pat Romanski ![]() Dec. 28, 2017 02:00 PM EST Reads: 4,850 |
By Elizabeth White ![]() Dec. 23, 2017 10:00 AM EST Reads: 2,631 |
By Elizabeth White ![]() Dec. 22, 2017 11:00 AM EST Reads: 2,162 |
By Elizabeth White ![]() Dec. 18, 2017 03:45 PM EST Reads: 3,781 |
By Elizabeth White ![]() Dec. 18, 2017 01:30 PM EST Reads: 3,797 |
By Elizabeth White ![]() Dec. 18, 2017 01:00 PM EST Reads: 5,627 |
By Pat Romanski ![]() Dec. 17, 2017 02:00 PM EST Reads: 2,760 |
By Elizabeth White ![]() Dec. 17, 2017 10:00 AM EST Reads: 2,909 |
By Liz McMillan ![]() Dec. 15, 2017 11:00 AM EST Reads: 3,454 |