Skip to content

Commit

Permalink
Updated site template + some content based on SEO optimization
Browse files Browse the repository at this point in the history
git-svn-id: https://svn.apache.org/repos/asf/shiro/site/trunk@1562965 13f79535-47bb-0310-9956-ffa450edef68
  • Loading branch information
Les Hazlewood committed Jan 30, 2014
1 parent 5777e66 commit 0ee3ca7
Show file tree
Hide file tree
Showing 29 changed files with 562 additions and 329 deletions.
64 changes: 15 additions & 49 deletions assets/css/style.css
Original file line number Diff line number Diff line change
Expand Up @@ -24,8 +24,8 @@

a:link {color:#3254a0; text-decoration:none;}
a:visited {color:#3254a0; text-decoration:none;}
a:hover {color:#3254a0; text-decoration:underline;}
a:active {color:#3254a0; text-decoration:none;}
a:hover {color: #4068c3; text-decoration:underline;}
a:active {color: #4377d7; text-decoration:none;}

body {
background:url(../images/back.jpg);
Expand Down Expand Up @@ -89,56 +89,22 @@ dl, menu, ol, ul, li {
margin:10px 0 0 0;
}

#navigation {
float:right;
position:relative;
width:600px;
margin:4px 10px 0 0;
padding:0 0 0 0;
}

.navigation-button {
background:url(../images/nav-buttons.png) 0px 0px no-repeat;
width:127px;
height:35px;
margin:0 11px 0 11px;
float:left;
text-align:center;
color:#3254a0;
text-shadow: 1px 1px 0px #fff;
filter: dropshadow(color=#fff, offx=1, offy=1);
padding:17px 0 0 0;
font-size:16px;
}

.navigation-button:hover {
background:url(../images/nav-buttons.png) 0px -52px no-repeat;
color:#FFF;
text-shadow:none;
ul.navigation {
float: right;
margin: 4px 10px 0 0;
padding: 25px 0 0 0;
}

.navigation-button:active {
background:url(../images/nav-buttons.png) 0px -52px no-repeat;
color:#FFF;
text-shadow:none;
}

#secondary-navigation {
float:right;
margin:-1.1em 13px 0 0;
padding:0;
ul.navigation ul {
margin: 0;
}

#secondary-navigation li {
float:left;
font-size:12px;
color:#3254a0;
padding:0 16px 0 16px;
border-left:#3254a0 solid 1px;
ul.navigation li {
list-style-type: none;
float: left;
padding: 0 0 0 27px;
}

#secondary-navigation li:first-child {
border:none;
ul.navigation a {
font-size: 1.1em;
font-weight: bold;
}

#content {
Expand Down
41 changes: 0 additions & 41 deletions authentication-features.html

This file was deleted.

47 changes: 47 additions & 0 deletions authentication-features.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
title: AuthenticationFeatures-ApacheShiroAuthenticationFeatures

#Apache Shiro Authentication Features

Authentication is the process of identity verification-- you are trying to verify a user is who they say they are. To do so, a user needs to provide some sort of proof of identity that your system understands and trusts.

The Shiro framework is designed to make authentication as clean and intuitive as possible while providing a rich set of features. Below is a highlight of the Shiro authentication features.

## Features

<table align="right" width="275" style="margin-left: 20px; margin-bottom: 20px; border-style: solid; border-width: 2px; border-color: navy" cellpadding="10px">

<tr>
<td>
<div id="border">
<h2>Related Content</h2>

<h3><a href="java-authentication-guide.html">Java Authentication Guide</a></h3>
<p>Learn how Authentication in Java is performed in Shiro. </br><span style="font-size:11"><a href="java-authentication-guide.html">Read More &gt;&gt;</a></span></p>

<h3><a href="authentication.html">Authentication Docs</a></h3>
<p>Full documentation on Shiro's Authentication functionality. </br><span style="font-size:11"><a href="authentication.html">Read More &gt;&gt;</a></span></p>

<h3><a href="get-started.html">Getting Started</a></h3>
<p>Resources, guides and tutorials for new Shiro users. </br><span style="font-size:11"><a href="get-started.html">Read More &gt;&gt;</a></span></p>

<h3><a href="webapp-tutorial.html">Web App Tutorial</a></h3>
<p>Step-by-step tutorial for securing a web application with Shiro. </br><span style="font-size:11"><a href="webapp-tutorial.html">Read More &gt;&gt;</a></span></p>

</div>
</td>
</tr>
</table>


* **Subject Based** - Almost everything you do in Shiro is based on the currently executing user, called a Subject. And you can easily retrieve the Subject anywhere in your code. This makes it easier for you to understand and work with Shiro in your applications.

* **Single Method call** - The authentication process is a single method call. Needing only one method call keeps the API simple and your application code clean, saving you time and effort.

* **Rich Exception Hierarchy** - Shiro offers a rich exception hierarchy to offered detailed explanations for why a login failed. The hierarchy can help you more easily diagnose code bugs or customer services issues related to authentication. In addition, the richness can help you create more complex authentication functionality if needed.

* **'Remember Me' built in** - Standard in the Shiro API is the ability to remember your users if they return to your application. You can offer a better user experience to your them with minimal development effort.

* **Pluggable data sources** - Shiro uses pluggable data access objects (DAOs), called Realms, to connect to security data sources like LDAP and Active Directory. To help you avoid building and maintaining integrations yourself, Shiro provides out-of-the-box realms for popular data sources like LDAP, Active Directory, Kerberos, and JDBC. If needed, you can also create your own realms to support specific functionality not included in the basic realms.

* **Login with one or more realms** - Using Shiro, you can easily authenticate a user against one or more realms and return one unified view of their identity. In addition, you can customize the authentication process with Shiro's notion of an authentication strategy. The strategies can be setup in configuration files so changes don't require source code modifications-- reducing complexity and maintenance effort.

44 changes: 0 additions & 44 deletions authorization-features.html

This file was deleted.

47 changes: 47 additions & 0 deletions authorization-features.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
title: Apache Shiro Authorization Features

# Apache Shiro Authorization Features

Authorization, also called access control, is the process of determining access rights to resources in an application. In other words, determining "who has access to what." Authorization is used to answer security questions like, "is the user allowed to edit accounts", "is this user allowed to view this web page", "does this user have access to this button?" These are all decisions determining what a user has access to and therefore all represent authorization checks.

Authorization is a critical element of any application but it can quickly become very complex. Shiro's goal is to eliminate much of the complexity around authorization so that you can more easily build secure software. Below is a highlight of the Shiro authorization features.

## Features

<table align="right" width="275" style="margin-left: 20px; margin-bottom: 20px; border-style: solid; border-width: 2px; border-color: navy" cellpadding="10px">

<tr>
<td>
<div id="border">
<h2>Related Content</h2>

<h3><a href="java-authorization-guide.html">Java Authorization Guide</a></h3>
<p>Learn how Shiro handles access control in Java. </br><span style="font-size:11"><a href="java-authorization-guide.html">Read More &gt;&gt;</a></span></p>

<h3><a href="authorization.html">Authorization Docs</a></h3>
<p>Full documentation on Apache Shiro's Authorization functionality. </br><span style="font-size:11"><a href="authorization.html">Read More &gt;&gt;</a></span></p>

<h3><a href="get-started.html">Getting Started</a></h3>
<p>Resources, guides and tutorials for new Shiro users. </br><span style="font-size:11"><a href="get-started.html">Read More &gt;&gt;</a></span></p>

<h3><a href="webapp-tutorial.html">Web App Tutorial</a></h3>
<p>Step-by-step tutorial for securing a web application with Shiro. </br><span style="font-size:11"><a href="webapp-tutorial.html">Read More &gt;&gt;</a></span></p>

</div>
</td>
</tr>
</table>

* **Subject-based** - Almost everything you do in Shiro is based on the currently executing user, called a Subject. And you can easily access the subject retrieve the Subject and checks its roles, permissions, or other relevant attributes anywhere in your code. This makes it easier for you to understand and work with Shiro in your applications.

* **Checks based on roles or permissions** - Since the complexity of authorization differs greatly between applications, Shiro is designed to be flexible, supporting both role-based security and permission-based security based on your projects needs.

* **Powerful and intuitive permission syntax** - As an option, Shiro provides an out-of-the-box permission syntax, called Wildcard Permissions, that help you model the fine grained access policies your application may have. By using Shiro's Wildcard Permissions you get an easy-to-process and human readable syntax. Moreoever, you don't have to go through the time-consuming effort and complexity of creating your own method for representing your access policies.

* **Multiple enforcement options** &#8211; Authorization checks in Shiro can be done through in-code checks, JDK 1.5 annotations, AOP, and JSP/GSP Taglibs. Shiro's goal is to give you the choice to use the option you think are best based on your preferences and project needs.

* **Strong caching support** - Any of the modern open-source and/or enterprise caching products can be plugged in to Shiro to provide a fast and efficient user-experience. For authorization, caching is crucial for performance in larger environments or with more complex policies using back-end security data sources.

* **Pluggable data sources** - Shiro uses pluggable data access objects, referred to as Realms, to connect to security data sources where you keep your access control information, like a LDAP or a relational database. To help you avoid building and maintaining integrations yourself, Shiro provides out-of-the-box realms for popular data sources like LDAP, Active Directory, Kerboros, and JDBC. If needed, you can also create your own realms to support specific functionality not included in the basic realms.

* **Supports any data model** - Shiro can support any data model for access control-- it doesn't force a model on you. Your realm implementation ultimately decides how your permissions and roles are grouped together and whether to return a "yes" or a "no" answer to Shiro. This feature allows you to architect your application in the manner you chose and Shiro will bend to support you.
18 changes: 17 additions & 1 deletion cas.html
Original file line number Diff line number Diff line change
@@ -1,5 +1,21 @@
<h1><a name="CAS-IntegratingApacheShirowithCASSSOserver"></a>Integrating Apache Shiro with CAS SSO server</h1>

<table align="right" width="275" style="margin-left: 20px; margin-bottom: 20px; border-style: solid; border-width: 2px; border-color: navy" cellpadding="10px">

<tr>
<td>
<div id="border">

<h2>Related Content</h2>
<h3><a href="web-features.html">Web Apps with Shiro</a></h3>
<p>Learn more about integrating Shiro into web applications. </br><span style="font-size:11"><a href="web-features.html">Read More &gt;&gt;</a></span></p>

</div>
</td>
</tr>
</table>


<p>The <em>shiro-cas</em> module is made to protect a web application with a <a class="external-link" href="http://www.jasig.org/cas" rel="nofollow">Jasig CAS</a> SSO server. It enables a Shiro-enabled application to be a CAS client.</p>

<h2><a name="CAS-BasicunderstandingoftheCASprotocol"></a>Basic understanding of the CAS protocol</h2>
Expand Down Expand Up @@ -158,4 +174,4 @@ <h3><a name="CAS-Completeconfigurationsample"></a>Complete configuration sample<

<h2><a name="CAS-History"></a>History</h2>

<p><em>Version 1.2.0</em>&#160;: first release of the <em>shiro-cas</em> module.</p>
<p><em>Version 1.2.0</em>&#160;: first release of the <em>shiro-cas</em> module.</p>
Loading

0 comments on commit 0ee3ca7

Please sign in to comment.