
The following entries will be added to your existing ICEfaces application web.xml: The following jars are included in the application lib folder:Īlthough the spring.jar is included, knowledge of Spring is not required for basic authentication and authorization
3: Successful Authentication, Failed AuthorizationĪdd Spring Security to an ICEfaces Application 1: jars. 1: Successful Authentication and Authorization. Spring Authentication and Authorization. Add Spring Security to an ICEfaces Application. This tutorial will discuss the following topics related to Spring Security with ICEfaces: This is accomplished using the ICEfaces' enabledOnUserRole Making a purchase is a secure function, so the user will only have the "buy" button enabled The user can visit the purchase page if they have Spring Security will ensure the user ID has been authenticatedĪnd that the user's presence on the purchase page is authorized. Redirected to a page where a purchase can be made. If the user attempts to log in with the correct user name and password, the user will be Initially, the application will present a #Icefaces subtable code
It is an adaptation/port of Seema Richard's code usingĪnd JSF. The application uses Spring Security 2.0 and ICEfaces. Additionally, Spring Security and ICEfaces components will be used to authorize access to different This tutorial will walk you through the process of using Spring Security for authentication of an ICEfaces/JSF webĪpplication. The ICEfaces Tutorial Table of Contents Basic Spring Security with ICEfaces