OpenSuSE Linux 11.3 | tomcat-coyote-6.0.24 | catalina-6.0.24
OpenSuSE Linux 11.3 | tomcat-coyote-6.0.24 | catalina-6.0.24
OpenSuSE Linux 11.3 | tomcat-coyote-6.0.24 | catalina-6.0.24
william conley wrote:Very general, but the concept must also apply to those already on the page. If they walk away from their machines, their session will expire automatically
and on all pages not just the entry page.
At this point I am personally a bit of a beginner in the tomcat arena
I just don't know how to "kill" a session manually
and then of course I'll need to add a utility to track "last usage" (unless there's a method to query the session to get last usage already)
OpenSuSE Linux 11.3 | tomcat-coyote-6.0.24 | catalina-6.0.24
Bear Bibeault wrote:Use a servlet filter to make sure that a person is authenticated before going to a secured page (as well as to perform the timeout checking). When they exceed their timeout, force them to reauthenticate before they can proceed to the page.
Experience keeps a dear School, but Fools will learn in no other.
---
Benjamin Franklin - Postal official and Weather observer
Experience keeps a dear School, but Fools will learn in no other.
---
Benjamin Franklin - Postal official and Weather observer
Tim Holloway wrote:Once I had the user's timeout interval, I could then check it against a session variable holding the timestamp of the user's previous request, and if exceeded, kick in the logout sequence.
Bear Bibeault wrote:
Tim Holloway wrote:Once I had the user's timeout interval, I could then check it against a session variable holding the timestamp of the user's previous request, and if exceeded, kick in the logout sequence.
That is what I proposed.
Experience keeps a dear School, but Fools will learn in no other.
---
Benjamin Franklin - Postal official and Weather observer
We will certainly test this and implement a logout command if need be.Any "logout" code would have to be executed in the session destruction listener method.
OpenSuSE Linux 11.3 | tomcat-coyote-6.0.24 | catalina-6.0.24
Tim Holloway wrote:JEE concentrates on doing two things (authentication and authorization) and doing them with iron-clad reliability. No bells and whistles; you cannot have security exploits in code that isn't there.
SCJP 1.6,Preparing (Tryin to prepare) for scwcd
Harsha Ka wrote:
Tim Holloway wrote:JEE concentrates on doing two things (authentication and authorization) and doing them with iron-clad reliability. No bells and whistles; you cannot have security exploits in code that isn't there.
Does this mean that container based security will be enough even for financial institutions where high security is required? Or do they need to have some custom security implementation also built in their system?
Experience keeps a dear School, but Fools will learn in no other.
---
Benjamin Franklin - Postal official and Weather observer