Uploaded image for project: 'WildFly Core'
  1. WildFly Core
  2. WFCORE-1948

Management IN-VM Bypass

XMLWordPrintable

      Previously we were able to detect in-vm calls as they did not have a Subject established on the AccessControlContext.

      Switching to WildFly Elytron we are guaranteed to always have a SecurityIdentity as by default an anonymous one will always be created.

      This task is to add an API for in-vm calls backed by security manager based permission checks to allow tasks to be executed "bypassing" access control. Our default implementation is role based so this bypass will work by assuming the SuperUser role.

              darran.lofthouse@redhat.com Darran Lofthouse
              darran.lofthouse@redhat.com Darran Lofthouse
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: