I was showing someone my design for the assignment and they asked me where my security was implemented. I was taken a little off gaurd.
I guess I've pretty much followed the Cade part 2 example. So my answer was security is handled by the Controllers. What do others think about this?
Hi Peter, I think everyone should spend some time walking through their architecture from a security point of view after all the business needs are met. It will raise some very interesting questions. Things like, how will security be handled in the web app vs the java app? how will security credentials be propogated? do you only need authentication or authorization constraints too? would you choose to use ejb client container security or ejb server security? and why? is there a need for performing programmatic authorization? and if yes, where does that responsibility lie? what kind of security would you need while interfacing with external system? who handles it? Does every function need security? what are its implication on performance? After you go through all these scenarios and many others, which I might have missed, you would be in a better position to envision the security hooks in your architecture.