Skip to content

Latest commit

 

History

History
125 lines (92 loc) · 6.26 KB

README.md

File metadata and controls

125 lines (92 loc) · 6.26 KB

Jackrabbit Oak - Exercise

Oak module providing exercises for developers who wish to become familiar with the Oak code base and understand the design principals and implementation details.

NOTE: This module is not suited as reference for 'best-practises' for JCR and Jackrabbit API consumers. Instead it often uses low-level implementation access to illustrate a particular pattern or detail.

Mandatory Preparation

Apart from the exercise code, you need have to following source packges installed

Please make sure you have the following source code on your computer and setup in your preferred IDE

Recommended Reading

As preparation of the introduction it is recommended to take a look at security related sections of the JSR283 and to make yourself familiar with the security related areas of the API as well with the extensions defined in Apache Jackrabbit. JSR 283 : Content Repository for Java Technology API Specification v2.0

The following sections of the specification deal with security in particular with authentication and authorization.

You can also find the correspoding parts of the API documentation:

Apache Jackrabbit : API Extensions for JSR 283

The JavaDoc for the latest Jackrabbit API (2.10) can be found at http://jackrabbit.apache.org/api/2.10/

Oak Documentation

There exists some documentation about Oak Security at http://jackrabbit.apache.org/oak/docs/security/overview.html. That should cover everything that is being looked at during that introduction. Further References Java Authentication and Authorization Service (JAAS)

Note that we only make use of the Authentication part of JAAS. Nevertheless the following documents might be useful to consult when you are dealing with authentication.

Java API References

The following API references to some authentication related classes that we keep referring to when talking about security in the repository General Security

Authentication

Using the Exercise Module

TODO

How to Verify your Solutions

TODO