• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Tim Cooke
  • paul wheaton
  • Paul Clapham
  • Ron McLeod
Sheriffs:
  • Jeanne Boyarsky
  • Liutauras Vilda
Saloon Keepers:
  • Tim Holloway
  • Carey Brown
  • Roland Mueller
  • Piet Souris
Bartenders:

Dream Car Assignment

 
Ranch Hand
Posts: 36
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hello All,

As part of the assigment there is a requirement which suggests that only authenticated users can use the system and its functionality. But the assignment document does not provide any details about the authentication to be used.

How do I cover as part of my design ? I was thinking of resolving the user by login name from security context when needed.

Any suggestions ranchers ?

Regards
Paren Parikh
 
Greenhorn
Posts: 18
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Maybe it can help you.
http://www.coresecuritypatterns.com/
 
Paren Parikh
Ranch Hand
Posts: 36
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
My question is do I need to provide any design for authentication making many assumptions ? If some one else is working on the same assignment how have they thought about it ?
 
Ranch Hand
Posts: 42
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
I think the authentication mechanism needs to be built with the design even if there are no use cases explaining that. You may not need detailed structure of those. I feel it needs to be specified
 
reply
    Bookmark Topic Watch Topic
  • New Topic