|Publication Type||Web Article|
|Year of Publication||2008|
|Authors||Robert Patt-Corner; Keys Botzum|
|Key Words||EAz; ACL; Access; Security; Authorization|
Java™ developers attempting to exert fine-grained control over access to application resources quickly reach the limits of built-in Java Platform, Enterprise Edition (Java EE) declarative authorization. Part 1 of this three-part series on Enum-based Authorization (EAz) described the basic architecture of a complete Access Control List (ACL) implementation in Java 5. Part 2 described the usage and implementation of an EAz authorization solution. Part 3 concludes this series by illustrating a technique for integrating EAz into a graphical interface, implementing a JavaServer™ Faces solution to the problem of using a Web application to graphically represent which discrete permissions are available to a user or group in a Web framework.