This week's book giveaway is in the Cloud forum.
We're giving away four copies of Terraform in Action and have Scott Winkler on-line!
See this thread for details.
Win a copy of Terraform in Action this week in the Cloud forum!

Kalaivanan Durairaj

Greenhorn
+ Follow
since Jun 30, 2006
Cows and Likes
Cows
Total received
0
In last 30 days
0
Total given
0
Likes
Total received
0
Received in last 30 days
0
Total given
0
Given in last 30 days
0
Forums and Threads
Scavenger Hunt
expand Ranch Hand Scavenger Hunt
expand Greenhorn Scavenger Hunt

Recent posts by Kalaivanan Durairaj

Hi, Thanks for the reply. Context parameters are for accessing the JNDI service. This may not be the pricipal and password user used to login to the web tier. I browsed EJB spec section 19.8 "Security Interoperatability" and found some information. Thanks.
Hello,

I would like to know how authenticated user information (username, Principal etc) is propagated from web-tier to ejb-tier. web app and ejb components can be deployed in seperate physical servers in network. web app code just gets the home object from JNDI tree to make calls on ejb components, So I don't see any place where the identity propagation happens - somebody please throw some light.

Also when a user is authenticated and identified where does this information stored? I guess request object, since it provides a getUserPrincipal() like methods in request object.

If so, in case if I use my own custom authentication mechanism, how can I set the authenticated user information so that declarative security take effect in web tier and ejb tier?
Hello,

I would like to know how authenticated user information (username, Principal etc) is propagated from web-tier to ejb-tier. web app and ejb components can be deployed in seperate physical servers in network. web app code just gets the home object from JNDI tree to make calls on ejb components, So I don't see any place where the identity propagation happens - somebody please throw some light.

Also when a user is authenticated and identified where does this information stored? I guess request object, since it provides a getUserPrincipal() like methods in request object.

If so, in case if I use my own custom authentication mechanism, how can I set the authenticated user information so that declarative security take effect in web tier and ejb tier?
Hello Sridhar, It took me around 40 days to prepare for the exam (I only prepared on weekends and sometimes weekday evenings). I am working on a Java project for past 2 yrs.
Actually, I got a question on this same topic in exam.

Lets take this statement ${5 + 5}

If ELIgnored="false" then the following is sent as response to client

10

If ELIgnored="true" then the following is sent as response to client

${5 + 5}

The EL statement is just treated like a template text. As it says, EL is just ignored, not disabled. Note, when you set <scripting-disabled> tag to true in DD then the JSP MUST NOT contain scripting.
Dear All,
Thanks for all your wonderful comments.
Please download it from the below link:

http://rapidshare.de/files/32214600/kd_scwcd.rar

Moore, Congrats for clearing SCWCD. I agree, this cert required me to remember lot of things. I had the same feeling when i start studying for SCJP... both required me to be either 'living reference manual/living compiler' upto some extent. But later i realized that doing cert is a structured way of learning rather than just getting that title. What do you say?

Sorry for late reply, was busy with project work.
Thanks everyone for your encouraging posts!

I had written study notes, while I studied for this exam.

They are posted at ScwcdLinks
[ October 07, 2006: Message edited by: Marc Peabody ]
First I would like to thank you all who helped me in my preperation, directly or indirectly.

I studied both HEAD FIRST and Deshmukh. Both helped a lot to understand in depth. I also skim thru the spec, whenever I need more details on specific topics. While I study, I was keep adding all the important stuff to a word document and reviewed that twice close to exam.

I practiced with lot of mock exams and questions available online including Javaranch.

I missed 2 questions out of 69. Thanks again for all your help.

Kalai
SCJP 95% SCWCD 97%
When overloaded methods present, the most specific method will be mapped for given method call. For this, out of all overloaded versions one version should be identified as more specific than all other.

The value 'null' can be assigned to both String and Object. But String type is close match than Object, since String extends Object.

Now, if you look at the method call (null, null) the first argument will match the second method (String, Object) over first, where as the second argument will match first method (String, Object) over second.

Try these:
methodTest((Object)null,null); or
methodTest(null,(Object)null);
Don't worry. Since you are already half way with 1.4 just go ahead with it.

Its nice to have certification on the latest version. But it does not mean the previous version is invalid or something. Still vast number of people are taking 1.4 Even if you start studying now for 5.0 you may hear about 6.0 just before you are about to take the exam :-) So don't worry and get confused, focus on what you have already started.... All the best!
[ June 30, 2006: Message edited by: Kalaivanan D ]