SlideShare a Scribd company logo
Webinar
J2EE Security with Apache SHIRO
16th April, 2013
Agenda
Authentication, Authorization, Session Management and Cryptography
Introduction on market trending security framework
Discussion on market trending security framework
Grails inbuilt security
Live Demo on integrating shiro security with grails web application
Conclusion
Q&A
Agenda
Authentication, Authorization, Session Management and Cryptography
Introduction on market trending security framework
Discussion on market trending security framework
Grails inbuilt security
Live Demo on integrating shiro security with grails web application
Conclusion
Q&A
What is Authentication, Authorization & Session Mgmt.?
 Authentication: prove genuineness
 Authorization: process of granting approval or permission on
resources.
 Session Management: Session management means authenticate
once and confirms on every action that the user is the one who
provided the original credentials.
 Key cornerstones in the security of a system.
 Authentication and authorization are two very related, and yet
separate, concepts.
 Where Authentication deals with identifying a user, the Authorization
determines what a user is allowed to do.
What is Authentication, Authorization & Session Mgmt.?
Designers and developers should leverage authorization, authentication and session
management capabilities as much as possible.
Agenda
Authentication, Authorization, Session Management and Cryptography
Introduction on market trending security framework
Discussion on market trending security framework
Grails inbuilt security
Live Demo on integrating shiro security with grails web application
Conclusion
Q&A
Introduction on market trending security framework
Java Authentication and Authorization Service or JAAS
Apache Shiro Security
Spring Security
Agenda
Authentication, Authorization, Session Management and Cryptography
Introduction on market trending security framework
Discussion on market trending security framework
Grails inbuilt security
Live Demo on integrating shiro security with grails web application
Conclusion
Q&A
1 Javax.security to be imported.
Discussion on market trending security framework
JAAS Security Configuration Steps:
2 Implement LoginModule Interface
3 Override methods like initialize, login, commit, abort, logout.
4 Implement call back handlers
5 Implement privilege action
6 Configure jaas policy files
7 Implement Filters
Discussion on market trending security framework
Spring Security Configuration Steps:
2 Install spring security libraries
3 Create & Configure spring-security.xml file in class path.
4 Provide @secured annotation above methods based on the privileges
Install spring core libraries1
Discussion on market trending security framework
Shiro Security Configuration Steps:
2 Create and configure shiro.ini file in class path
3 Provide roles and privileges in shiro.ini
Install shiro libraries and required libraries to project1
Discussion on market trending security framework
Shiro Spring Security JAAS
Simplicity Bit Complicated (Not easily
fathomable)
More complicated.
Enterprise session management is
supported
Not Supported Not supported
Better cryptography simplified cryptography
Grails plugin available Grails plugin available Grails plugin is not available
Work and Gel with every
environment Spring is not
mandatory
Dependent on Spring core libraries Part of Java and can work and
get with every environment
Agenda
Authentication, Authorization, Session Management and Cryptography
Introduction on market trending security framework
Discussion on market trending security framework
Grails inbuilt security
Live Demo on integrating shiro security with grails web application
Conclusion
Q&A
Grails inbuilt security
 GORM - SQL escaped to prevent SQL injection attacks
 The default scaffolding templates HTML escape all data fields when displayed
 Link creating tags use appropriate escaping mechanisms to prevent code injection
 Codecs to prevent injection attacks.
Grails inbuilt security
class SecurityFilters {
def filters = {
loginCheck(controller: '*', action: '*') {
before = {
if (!session.user && actionName != "login") {
redirect(controller: "user", action: "login")
return false
}
}
}
}
}
Agenda
Authentication, Authorization, Session Management and Cryptography
Introduction on market trending security framework
Discussion on market trending security framework
Grails inbuilt security
Live Demo on integrating shiro security with grails web application
Conclusion
Q&A
Integrating shiro security with existing application
Application Diagram without SHIRO
Integrating shiro security with existing application
Agenda
Authentication, Authorization, Session Management and Cryptography
Introduction on market trending security framework
Discussion on market trending security framework
Grails inbuilt security
Live Demo on integrating shiro security with grails web application
Conclusion
Q&A
Conclusion
With shiro it is quite easy to configure security, shiro takes care of most of the issues
through its default settings, existing Java security mechanisms like JAAS, Spring security
are too confusing, complex etc.
Agenda
Authentication, Authorization, Session Management and Cryptography
Introduction on market trending security framework
Discussion on market trending security framework
Grails inbuilt security
Live Demo on integrating shiro security with grails web application
Conclusion
Q&A
Questions and Answers
Write us on info@cygnet-infotech.com to
get a free demo Session
Free Consultation
Contact Us
Email: info@cygnet-infotech.com
Website: www.cygnet-infotech.com
Facebook
LinkedIn
Twitter - @CygnetInfotech
Skype – cygnet-infotech-pvt-ltd
India
Cygnet Infotech Pvt Ltd.
2A, Manikyam, Opp. Samudra Annexe,
Nr. Shilp Cross Roads, Off. C. G. Road,
Navrangpura, Ahmedabad, Gujarat, India.
Tel: +91-79-30487400;
Fax: +91-79-30487422
USA
Cygnet Infotech LLC.
Mack-Cali Centre III,
140 E, Ridgewood Avenue,
Suite 415 ST, Paramus, NJ 07652.
Tel: +1-201-995-7444;
Fax : +1-201-221-8516

More Related Content

PPTX
Learn Apache Shiro
PPTX
ApacheCon 2014: Infinite Session Clustering with Apache Shiro & Cassandra
PPTX
Spring Security
PPTX
Spring Security 3
PDF
Spring Framework - Spring Security
PPTX
Spring security
PPTX
Spring Security 5
PDF
Fun With Spring Security
Learn Apache Shiro
ApacheCon 2014: Infinite Session Clustering with Apache Shiro & Cassandra
Spring Security
Spring Security 3
Spring Framework - Spring Security
Spring security
Spring Security 5
Fun With Spring Security

What's hot (20)

PPTX
Spring Security
PDF
Spring Security
PDF
Super simple application security with Apache Shiro
PPT
Spring Security Introduction
PPTX
Octopus framework; Permission based security framework for Java EE
PPTX
Intro to Apache Shiro
PDF
Enterprise Security mit Spring Security
PDF
From 0 to Spring Security 4.0
PPTX
Java Security Framework's
PPTX
Building Layers of Defense with Spring Security
PPTX
Spring security
PDF
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
PDF
Java EE Application Security With PicketLink
PPT
Security in java ee platform: what is included, what is missing
PPTX
Access Control Pitfalls v2
PPTX
Token Authentication in ASP.NET Core
PPTX
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
PPTX
Security asp.net application
PPTX
Top Ten Java Defense for Web Applications v2
PPTX
REST API Security: OAuth 2.0, JWTs, and More!
Spring Security
Spring Security
Super simple application security with Apache Shiro
Spring Security Introduction
Octopus framework; Permission based security framework for Java EE
Intro to Apache Shiro
Enterprise Security mit Spring Security
From 0 to Spring Security 4.0
Java Security Framework's
Building Layers of Defense with Spring Security
Spring security
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Java EE Application Security With PicketLink
Security in java ee platform: what is included, what is missing
Access Control Pitfalls v2
Token Authentication in ASP.NET Core
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
Security asp.net application
Top Ten Java Defense for Web Applications v2
REST API Security: OAuth 2.0, JWTs, and More!
Ad

Similar to J2EE Security with Apache SHIRO (20)

PDF
Apache shiro security framework
PPT
Secure visual algorithm simulator
PPTX
Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
PDF
SailPoint VS CyberArk.pdf
PPTX
Chap 6 cloud security
PPTX
Making Security Agile
PDF
Building a Product Security Practice in a DevOps World
PPTX
Product security by Blockchain, AI and Security Certs
PPTX
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
PPTX
Cloud Security Fundamentals Webinar
PDF
Multi-Factor Authentication Evaluation Guide.pdf
PDF
Multi-Factor Authentication Evaluation Guide.pdf
PPTX
API Security: Essential Practices for Developers
PPTX
The user s identities
PPTX
Build a complete security operations and compliance program using a graph dat...
PDF
Common 2009 Getting Started On The Road To Compliance
PPTX
Spring Security services for web applications
PDF
Getting started with Spring Security
PPT
Path Maker Security Presentation
PDF
Spring security4.x
Apache shiro security framework
Secure visual algorithm simulator
Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
SailPoint VS CyberArk.pdf
Chap 6 cloud security
Making Security Agile
Building a Product Security Practice in a DevOps World
Product security by Blockchain, AI and Security Certs
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Cloud Security Fundamentals Webinar
Multi-Factor Authentication Evaluation Guide.pdf
Multi-Factor Authentication Evaluation Guide.pdf
API Security: Essential Practices for Developers
The user s identities
Build a complete security operations and compliance program using a graph dat...
Common 2009 Getting Started On The Road To Compliance
Spring Security services for web applications
Getting started with Spring Security
Path Maker Security Presentation
Spring security4.x
Ad

More from Cygnet Infotech (20)

PPTX
Roadmap for Digital Transformation
PPTX
Robotic Process Automation Capabilities - Cygnet Infotech
PDF
Enterprise QA and Application Testing Services
PPSX
Salesforce CRM - To Achieve Unparalleled ROI
PPSX
Full-stack Front-end Engineering Services
PPTX
Modernizing Supply Chain with Blockchain Technology
PPSX
IT Consulting - Aligning Technology to Business Strategy
PPTX
Emerging Technologies: The Power to Future Ready Business
PPSX
Cloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
PPSX
Microsoft Dynamics 365 - The Engine that Thrives Transformation
PPSX
DevOps - The Best Way to Break the Silos
PPSX
Robotic Process Automation (RPA) in Manufacturing Industry
PPSX
Quality Engineering in the New Era
PPSX
5 ways blockchain improves business flexibility
PDF
5 Reasons to Adopt Product Engineering
PPTX
Successful SAP Implementation Checklist
PPTX
The Quality Assurance Checklist for Progressive Testing
PPTX
DevOps - The Key to Rapid Productization (Introduction to the 5C's of DevOps)
PPTX
Introduction to Blockchain-as-a-Service (BaaS)
PPTX
5 Ways MS Dynamics 365 Empowers Digital Transformation
Roadmap for Digital Transformation
Robotic Process Automation Capabilities - Cygnet Infotech
Enterprise QA and Application Testing Services
Salesforce CRM - To Achieve Unparalleled ROI
Full-stack Front-end Engineering Services
Modernizing Supply Chain with Blockchain Technology
IT Consulting - Aligning Technology to Business Strategy
Emerging Technologies: The Power to Future Ready Business
Cloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Microsoft Dynamics 365 - The Engine that Thrives Transformation
DevOps - The Best Way to Break the Silos
Robotic Process Automation (RPA) in Manufacturing Industry
Quality Engineering in the New Era
5 ways blockchain improves business flexibility
5 Reasons to Adopt Product Engineering
Successful SAP Implementation Checklist
The Quality Assurance Checklist for Progressive Testing
DevOps - The Key to Rapid Productization (Introduction to the 5C's of DevOps)
Introduction to Blockchain-as-a-Service (BaaS)
5 Ways MS Dynamics 365 Empowers Digital Transformation

Recently uploaded (20)

PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Architecture types and enterprise applications.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
1. Introduction to Computer Programming.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
project resource management chapter-09.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
DP Operators-handbook-extract for the Mautical Institute
Architecture types and enterprise applications.pdf
A comparative study of natural language inference in Swahili using monolingua...
A contest of sentiment analysis: k-nearest neighbor versus neural network
1. Introduction to Computer Programming.pptx
Hindi spoken digit analysis for native and non-native speakers
WOOl fibre morphology and structure.pdf for textiles
Zenith AI: Advanced Artificial Intelligence
Developing a website for English-speaking practice to English as a foreign la...
NewMind AI Weekly Chronicles - August'25-Week II
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Getting started with AI Agents and Multi-Agent Systems
Enhancing emotion recognition model for a student engagement use case through...
project resource management chapter-09.pdf
Hybrid model detection and classification of lung cancer
A novel scalable deep ensemble learning framework for big data classification...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Final SEM Unit 1 for mit wpu at pune .pptx
observCloud-Native Containerability and monitoring.pptx

J2EE Security with Apache SHIRO

  • 1. Webinar J2EE Security with Apache SHIRO 16th April, 2013
  • 2. Agenda Authentication, Authorization, Session Management and Cryptography Introduction on market trending security framework Discussion on market trending security framework Grails inbuilt security Live Demo on integrating shiro security with grails web application Conclusion Q&A
  • 3. Agenda Authentication, Authorization, Session Management and Cryptography Introduction on market trending security framework Discussion on market trending security framework Grails inbuilt security Live Demo on integrating shiro security with grails web application Conclusion Q&A
  • 4. What is Authentication, Authorization & Session Mgmt.?  Authentication: prove genuineness  Authorization: process of granting approval or permission on resources.  Session Management: Session management means authenticate once and confirms on every action that the user is the one who provided the original credentials.  Key cornerstones in the security of a system.  Authentication and authorization are two very related, and yet separate, concepts.  Where Authentication deals with identifying a user, the Authorization determines what a user is allowed to do.
  • 5. What is Authentication, Authorization & Session Mgmt.? Designers and developers should leverage authorization, authentication and session management capabilities as much as possible.
  • 6. Agenda Authentication, Authorization, Session Management and Cryptography Introduction on market trending security framework Discussion on market trending security framework Grails inbuilt security Live Demo on integrating shiro security with grails web application Conclusion Q&A
  • 7. Introduction on market trending security framework Java Authentication and Authorization Service or JAAS Apache Shiro Security Spring Security
  • 8. Agenda Authentication, Authorization, Session Management and Cryptography Introduction on market trending security framework Discussion on market trending security framework Grails inbuilt security Live Demo on integrating shiro security with grails web application Conclusion Q&A
  • 9. 1 Javax.security to be imported. Discussion on market trending security framework JAAS Security Configuration Steps: 2 Implement LoginModule Interface 3 Override methods like initialize, login, commit, abort, logout. 4 Implement call back handlers 5 Implement privilege action 6 Configure jaas policy files 7 Implement Filters
  • 10. Discussion on market trending security framework Spring Security Configuration Steps: 2 Install spring security libraries 3 Create & Configure spring-security.xml file in class path. 4 Provide @secured annotation above methods based on the privileges Install spring core libraries1
  • 11. Discussion on market trending security framework Shiro Security Configuration Steps: 2 Create and configure shiro.ini file in class path 3 Provide roles and privileges in shiro.ini Install shiro libraries and required libraries to project1
  • 12. Discussion on market trending security framework Shiro Spring Security JAAS Simplicity Bit Complicated (Not easily fathomable) More complicated. Enterprise session management is supported Not Supported Not supported Better cryptography simplified cryptography Grails plugin available Grails plugin available Grails plugin is not available Work and Gel with every environment Spring is not mandatory Dependent on Spring core libraries Part of Java and can work and get with every environment
  • 13. Agenda Authentication, Authorization, Session Management and Cryptography Introduction on market trending security framework Discussion on market trending security framework Grails inbuilt security Live Demo on integrating shiro security with grails web application Conclusion Q&A
  • 14. Grails inbuilt security  GORM - SQL escaped to prevent SQL injection attacks  The default scaffolding templates HTML escape all data fields when displayed  Link creating tags use appropriate escaping mechanisms to prevent code injection  Codecs to prevent injection attacks.
  • 15. Grails inbuilt security class SecurityFilters { def filters = { loginCheck(controller: '*', action: '*') { before = { if (!session.user && actionName != "login") { redirect(controller: "user", action: "login") return false } } } } }
  • 16. Agenda Authentication, Authorization, Session Management and Cryptography Introduction on market trending security framework Discussion on market trending security framework Grails inbuilt security Live Demo on integrating shiro security with grails web application Conclusion Q&A
  • 17. Integrating shiro security with existing application Application Diagram without SHIRO
  • 18. Integrating shiro security with existing application
  • 19. Agenda Authentication, Authorization, Session Management and Cryptography Introduction on market trending security framework Discussion on market trending security framework Grails inbuilt security Live Demo on integrating shiro security with grails web application Conclusion Q&A
  • 20. Conclusion With shiro it is quite easy to configure security, shiro takes care of most of the issues through its default settings, existing Java security mechanisms like JAAS, Spring security are too confusing, complex etc.
  • 21. Agenda Authentication, Authorization, Session Management and Cryptography Introduction on market trending security framework Discussion on market trending security framework Grails inbuilt security Live Demo on integrating shiro security with grails web application Conclusion Q&A
  • 23. Write us on info@cygnet-infotech.com to get a free demo Session Free Consultation
  • 24. Contact Us Email: info@cygnet-infotech.com Website: www.cygnet-infotech.com Facebook LinkedIn Twitter - @CygnetInfotech Skype – cygnet-infotech-pvt-ltd India Cygnet Infotech Pvt Ltd. 2A, Manikyam, Opp. Samudra Annexe, Nr. Shilp Cross Roads, Off. C. G. Road, Navrangpura, Ahmedabad, Gujarat, India. Tel: +91-79-30487400; Fax: +91-79-30487422 USA Cygnet Infotech LLC. Mack-Cali Centre III, 140 E, Ridgewood Avenue, Suite 415 ST, Paramus, NJ 07652. Tel: +1-201-995-7444; Fax : +1-201-221-8516