Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com
Answertopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

Configuring a rules file

Seam Security expects to find a RuleBase component called securityRules which it uses to evaluate permission checks. This is configured in components.xml as follows:
<components xmlns="https://jboss.com/products/seam/components"
            xmlns:core="https://jboss.com/products/seam/core"
            xmlns:security="https://jboss.com/products/seam/security"
            xmlns:drools="https://jboss.com/products/seam/drools"
            xmlns:xsi="https://www.w3.org/2001/XMLSchema-instance"
            xsi:schemaLocation=
                "https://jboss.com/products/seam/core 
                                              https://jboss.com/products/seam/core-1.2.xsd 
                 https://jboss.com/products/seam/components 
                                              https://jboss.com/products/seam/components-1.2.xsd
                 https://jboss.com/products/seam/drools 
                                              https://jboss.com/products/seam/drools-1.2.xsd"
                 https://jboss.com/products/seam/security 
                                              https://jboss.com/products/seam/security-1.2.xsd">                 
        
   <drools:rule-base name="securityRules">
       <drools:rule-files>
           <value>/META-INF/security.drl</value>
       </drools:rule-files>
   </drools:rule-base>    
   
</components>
Once the RuleBase component is configured, it's time to write the security rules.

 
 
  Published under the terms of the Open Publication License Design by Interspire