?
Solved

how to make JDBCRealm to check role only.

Posted on 2006-03-22
5
Medium Priority
?
221 Views
Last Modified: 2010-04-01
I posted the same question at web server section but no answer so far :( figure I try it here.


<Realm className="org.apache.catalina.realm.JDBCRealm" driverName="org.gjt.mm.mysql.Driver" connectionURL="jdbc:mysql://localhost/authority" connectionName="test" connectionPassword="test" userTable="users" userNameCol="user_name" userCredCol="user_pass" userRoleTable="user_roles" roleNameCol="role_name" />


Above is the typical Realm tag in Tomcat, as you can see it uses to verify user name, password and user roles.  However, I have tomcat working with IIS and IIS took care of checking the NT user name and password, is there a way I can use JDBCRealm to just verify the role only?
0
Comment
Question by:fylix0000
  • 2
3 Comments
 
LVL 29

Expert Comment

by:bloodredsun
ID: 16262841
Are you looking to implement single sign-on with Windows and Tomcat?
0
 

Author Comment

by:fylix0000
ID: 16263764
I'm using IIS to check the user name and password, which is basdically user's NT log on.  Once IIS "authenticate" this, tomcat will use the JDBCRealm to  "authorize" if  this NT user name has the correct role before it let the user in.  

Right now, the above Realm setup make Tomcat does both authentication and authorization process.


I albe to get IIS to check the user name and password but I do not know how to make Tomcat to check just the role only.
0
 
LVL 29

Accepted Solution

by:
bloodredsun earned 2000 total points
ID: 16267110
So it is single sign on to tomcat using the Windows credentials...
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Often times it's very very easy to extend a volume on a Linux instance in AWS, but impossible to shrink it. I wanted to contribute to the experts-exchange community a way of providing a procedure that works on an AWS instance. It can also be used on…
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
Despite its rising prevalence in the business world, "the cloud" is still misunderstood. Some companies still believe common misconceptions about lack of security in cloud solutions and many misuses of cloud storage options still occur every day. …
With just a little bit of  SQL and VBA, many doors open to cool things like synchronize a list box to display data relevant to other information on a form.  If you have never written code or looked at an SQL statement before, no problem! ...  give i…
Suggested Courses

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question