<h1>Security Documentation Plan</h1>
People and Roles
The security features described herein may be used by Java EE developers, GlassFish developers, or by GlassFish administrators. Summary of the Feature From a User's PerspectiveThe features described herein are proposed enhancements to security service in GlassFish v3. AvailabilityThe enhanced security features will be available in GlassFish v3. Statement of WorkMost of the enhanced security features will need to be documented in the GlassFish v3 Administration Guide. Some of the features will need to be documented in the GlassFish v3 Developer's Guide, and a few of the features will need to be documented in the Java EE tutorial. Some of the features will need to be documented in the Metro/WSIT User's Guide, which is out of the scope of this document, but which will be listed here for completeness. Documentation Impact:
Note - If a document is task based (as opposed to reference), the changes should be determined from the user task analysis for the feature. Changes to Books
GlassFish v3 Developer's Guide Changes
|
Section | Documentation Impact | Writer | Reviewers | Description of Change |
---|---|---|---|---|
Debbie Carson | Support for Annotations @RolesAllowed, @PermitAll and @DenyAll on Servlet WebServices: This feature would allow the use of annotations to define fine-grained access control ( authorization rules) for a web service. These annotations have been accepted as additional annotations to the Servlet 3.0 Specification. A blog by Shing Wai Chan ( http://blogs.oracle.com/swchan/entry/servlet_3_0_security_annotations ) that describes these annotations and shows how to use them has been published. Debbie Carson will describe these annotations and show how to use them with Servlets in the appropriate security chapter in the tutorial. There is no other GF doc impact. |
|||
Securing Web Applications | Add Digest Authentication to types of authentication supported | Debbie Carson | Wherever the types of authentication are mentioned, add Digest authentication. Create an example that uses Digest authentication. | |
Section | Documentation Impact | Writer | Reviewers | Description of Change |
---|---|---|---|---|
Issued Token Caching and Sharing, SSO among services: This is the one of most asked for features by the STS and WS-Trust implementation Metro user base. It extends the current use cases and is valuable for building large scale secured and trusted Web services solutions with Metro. Jiandong Guo specified that the Metro user guide should be updated for this feature and samples should be added to it. STS and WS-Trust are not currently mentioned in the Admin Guide nor the Dev Guide. | ||||
WS-Trust Renewing and Cancellation protocols: Token validation and token sharing among multiple services is already supported by Metro v1.x. This feature extends user control to the life cycles of issued tokens with STS. Jiandong Guo specified that the Metro user guide should be updated for this feature and samples should be added to it. STS and WS-Trust are not currently mentioned in the Admin Guide nor the Dev Guide. | ||||
Support for WS-Trust 1.4, WS-SecureConversation 1.4 and WS-SecurityPolicy 1.3: The Metro security developers need to make Metro compliant with WS-Trust 1.4, WS-SecureConversation 1.4, and WS-SecurityPolicy 1.3. The only doc impact is to update the versions of these three technologies where versions are called out - in the Metro User's Guide. | ||||
Support for Password Derived Keys: This feature, which is supported by the WS-SecurityPolicy specification but not by Metro v1.x, provides a way for a client with just a valid username and password to send a message that is both integrity and confidentiality-protected. Kumar Jyanti recommends that the Metro User's Guide be updated and samples that show how to use this feature be provided and explained in an associated blog. NetBeans tooling changes would be required and their associated documentation and OLH would need to be updated to reflect this feature. There is no direct doc impact to us. | ||||
Minor Security Features: Several relatively minor security enhancements that relate to a wide range of areas need to be implemented to provide adequate interoperability with Microsoft's .NET software, fix known bugs, improve logging and diagnostic messages, consolidate code, enforce best practices, propose what needs to be monitored by JMX management and monitoring, convert pipes to tubes, etc. The Metro User's Guide would need to be updated as each minor feature was implemented. No other GlassFish documentation impact. Additional samples may be required and all explanations to accompany these would be provided through blogs created by the Metro developers. |
Topic Title | Documentation Impact | Writer | Reviewers | Description of Change |
---|---|---|---|---|
Man Page Name and Section | Documentation Impact | Writer | Reviewers | Description of Change |
---|---|---|---|---|
The review schedule for the documentation items that are affected by this feature is provided in the following table.
Item | First Draft Start Date | First Draft End Date | Second Draft Start Date | Second Draft End Date | Final Version End Date | Final Version End Date |
---|---|---|---|---|---|---|
Reviewers are listed in the Statement of Work.
Email aliases: