|Home > Documentation > Reference > Samples > Sample applications > timereport - Web Application Security Sample|
This article focuses on the web application security related features of the Apache Geronimo server. The sample application covered in this article is a basic time reporting system that uses Servlets, JSPs and J2EE declarative security using the geronimo SQLLoginModule and the derby database.
After reading this article you should be able to configure Geronimo application server for web applications with declarative security features.
|NOTE: The sample does not actually add new employees when the manager function is executed. This capability may be added in the future. However the sample does demonstrate a method of implementing web application security using the pre-defined users.|
This article is organized into the following sections.
Apache Geronimo includes a Web application container supporting J2EE Web applications. The Web container itself supports basic configuration such as network ports and SSL options, and each Web application may include Geronimo-specific configuration information as well. Web applications participate in the Geronimo security infrastructure, so authenticating to a Web application allows access to secure EJBs and Connectors as well.
Apache Geronimo currently supports two Web containers: Jetty and Tomcat.
Jetty is a 100% Java HTTP Server and Servlet Container. This means that you do not need to configure and run a separate Web server in order to use servlets and JSPs to generate dynamic content. Jetty is a fully featured Web server for static and dynamic content.
Unlike separate server/container solutions, Jetty's Web server and Web application run in the same process without interconnection overheads and complications. Furthermore, as a pure java component, Jetty can be easily included in your application for demonstration, distribution or deployment. Jetty is available on all Java supported platforms.
Apache Tomcat is a servlet container developed at the Apache Software Foundation.
The Time Report application helps to report working times of different projects. Even though this is not a full blown time reporting application, it covers most of the displaying and security related features web applications in Apache Geronimo.
This sample application uses two security roles, namely manager and employee. Both type of users have to provide their credentials before reporting time tasks.
The employee role allows the user to report time.
The manager role allows the user to add employees.
The configuration of this application illustrates a simple form of hierarchical role based access control in that the javaee roles have disjoint permissions and the mapping from group principals to application roles provides users in the manager group with the employee role.
The Time Report application has the following list of pages.
The following figure illustrates overview of application flow:
By default the given sample application is directed to the Welcome page with a link to the Time Report functionality. The users can access the Time Report page by providing a valid user name and password to the Login page. If those provided user credentials are from a manager role, Time Report page will display an additional link to the Add Employees functionality too.
Below is the main folder hierarchy of the Time Reporting application. It display both JSPs and configuration files used in the application.
In addition to the above JSPs and configurations, two other servlets are also required to fulfill the business logic of the application.
Security configuration of the Time Report application is handled by the Geronimo deployment plan plan.xml and web.xml files.
web.xml includes the standard security constraints relating user roles to resources in the web application.
The Geronimo deployment plan ( plan.xml found after building the project at timereport/timereport-jetty/target/resources/META-INF/plan.xml) includes the Geronimo specific security configuration including the security realm configuration and the principal-role mapping relating the principals from the security realm to the application roles defined above in web.xml This project uses two roles, manager and employee. There is a business rule that every manager is an employee. This is enforced through the principal-role mapping: both the EmployeeGroup and ManagerGroup imply the app specific employee role.
To restrict access to the Add Employee functionality from Time Report page, programmatic authentication has beeen used as in indicated below.
To test the sample application open a browser and type http://localhost:8080/timereport. It will forward to the Welcome page of the application.
User can access Time Report page providing username as emp1 and password with pass1. To login to the application as a Manager provide mgm1 and pass3 credentials.
This article has shown you how to deploy web application in to the Geronimo Application server with J2EE declarative security features. You followed step-by-step instructions to build, deploy and test the sample application.
Some highlights of the article are: