A secure object is a term frequently used throughout the security
system. It does not refer to a business object that is being
secured, but instead refers to some infrastructure object that can have
security facilities provided for it by Spring Security.
For example, one secure object would be
whilst another would be HTTP
FilterInvocation. Note these are
infrastructure objects and their design allows them to represent a large
variety of actual resources that might need to be secured, such as business
objects or HTTP request URLs.
Each secure object typically has its own interceptor package.
Each package usually includes a concrete security interceptor (which subclasses
AbstractSecurityInterceptor) and an
for the type of resources the secure object represents.
|RunAsManager||Creates a new temporary
|AbstractSecurityInterceptor||Abstract class that implements security interception for secure objects.|
|AfterInvocationProviderManager||Provider-based implementation of
|InterceptorStatusToken||A return object received by
|MethodInvocationPrivilegeEvaluator||Allows users to determine whether they have "before invocation" privileges for a given method invocation.|
|RunAsManagerImpl||Basic concrete implementation of a