Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

Unable to render {include} The included page could not be found.

Implementing Your Own Security Data Access Object

In order to implement a new security data access object, one needs to implement UserDetailsService, an Acegi Security interface, and UserRoleListService, a Pentaho interface. To implement UserDetailsService, please consult the Acegi Security documentation. UserDetailsService implementations know how to get a user's record along with roles from some backend, given a username. The UserRoleListService interface is required for the Pentaho BI Platform administrative user interface for assigning access to action sequences. It's also a requirement for some of the security input parameters (e.g. listing all users).

  • No labels