Prev
Next
Chapter 19. Setup Housekeeping Tasks (STEP 12)
Home
Chapter 20. Exploring The
Veil2
Demos
Part III. Implementation Details
Table of Contents
20. Exploring The
Veil2
Demos
20.1. The
veil2_demo
Extension
20.2. The
veil2_minimal_demo
Extension
21. The Veil2 Implementation: What You Need To Know
21.1. User Customizations
21.2. Authentication
21.3. Privileges
21.4. Roles
21.5. Authentication Contexts
21.6. Role Assignment and Contexts
21.7. Session Contexts
21.8. Role Mappings and Mapping Contexts
22. For Developers
22.1. Performing Local Builds
22.2. Running Unit Tests
22.3. The Documentation Build
22.4. Releases
23. How
Veil2
Relates to the Original
Veil
23.1. What is
Veil
?
23.2. Where Did
Veil2
Come From?
24. Tips and Guidelines
24.1. Write Queries That Work Without
Veil2
24.2. Consider Reporting Blocked Accesses
24.3. Consider Testing With and Without Security
24.4. Denormalize Around Your Scopes
24.5. Use Secured Views To Implement Complex Queries
24.6. Avoid Drop...Cascade
25. Performance
25.1. Data For Evaluating Performance
25.2. Session Management Overhead
25.3. Privilege Testing Overhead
25.4. In Conclusion
26. Security
26.1. Fundamental Security Weaknesses
26.2. So, What Is It Good For?
26.3. Compromised Application Server, Really?
27. Contact Links
27.1. Reporting Bugs
27.2. Contributing
27.3. IRC
27.4. Email
27.5. Availability