Summary: This section describes the GigaSpaces security model
Overview
What is GigaSpaces Security?GigaSpaces Security provides comprehensive support for securing your data, services, or both. GigaSpaces provides a set of authorities granting privileged access to data, and for performing operations on services. Security comprises two major operations: authentication and authorization. Authentication is the process of establishing and confirming the authenticity of a principal. A principal in GigaSpaces terms, means a user (human or software) performing an action in your application. Authorization refers to the process of deciding whether a principal is allowed to perform this action. The flow means that a principal is first established by the authentication process, and then authorized by the authorization decision process, when performing actions. These concepts are common and not specific to GigaSpaces Security. At the authentication level, GigaSpaces Security is equipped with standard encryption algorithms (such as AES and MD5), which can be easily configured and replaced. The authentication layer is provided with a default implementation, which can be customized to integrate with other security standards (i.e. Spring Security). This layer is also known as the authentication manager. The authentication layer is totally independent from the authorization decision layer. The authorization decision manager is internal to GigaSpaces components, and is used to intercept unauthorized access/operations to data and services. GigaSpaces Security architecture has been designed to meet the needs of enterprise application security. We have tried to provide a complete experience throughout all the components, for a useful, configurable and extendable security system. GigaSpaces Main Security Features:
Getting StartedTo help you get started, the section goes through the basics, how to secure the components, administration tools, applying security to the HelloWorld example, and finally once you gain an in-depth understanding, shows you how to customize the security based on your application requirements. One such custom security implementation is the Spring Security Bridge. Section Contents
|
![]() |
GigaSpaces.com - Legal Notice - 3rd Party Licenses - Site Map - API Docs - Forum - Downloads - Blog - White Papers - Contact Tech Writing - Gen. by Atlassian Confluence |