November 2017
Intermediate to advanced
542 pages
14h 24m
English
Our simple target scenario is to grant user2@example.com read access to only the birthday party event. All other users will not have any access to any events. You will observe that this differs from our other examples, since user2@example.com is not otherwise associated with the birthday party event.
Although there are several ways to set up ACL checking, our preference is to follow the annotation-based approach that we used in this chapter's method-level annotations. This nicely abstracts the use of ACLs away from the actual interface declarations and allows for replacement (if you want) of the role declarations with something other than ACLs at a later date (should you so choose).
We'll add an annotation ...
Read now
Unlock full access