Search results
From Documentation
Page title matches
- [https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src#unsafe_eval_expressions See the MDN CSP documentation for [https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src#unsafe_inline_script See the MDN CSP documentation for mo9 KB (1,193 words) - 08:16, 17 May 2024
- ...tion security that presents a list of the 10 most critical web application security risks. The most recent edition of this document was published in 2013. ...t in full, or other abundant web resources for more information about each security risk. Depending on the nature of vulnerability, a front-end framework such5 KB (686 words) - 06:34, 17 January 2018
- ...tion security that presents a list of the 10 most critical web application security risks. The most recent edition of this document was published in 2017. ...t in full, or other abundant web resources for more information about each security risk. Depending on the nature of vulnerability, a front-end framework such6 KB (861 words) - 03:28, 10 May 2024
- = What is Content security policy?= Content-security-policy (CSP) is a security standard introduced to prevent XSS attacks (cross-site scripting) and other3 KB (376 words) - 10:24, 5 February 2024
- * Brief introduce Spring Security. Spring Security is an application framework that provides security services for J2EE-based enterprise software application. It is a popular an23 KB (3,113 words) - 05:17, 13 July 2023
- ZK Spring Security provides features to check a user's role and permissions so that you can de ZK Spring Security provides 2 ways to access user roles and permissions in a ZK application.5 KB (637 words) - 09:20, 13 December 2022
- ...rity tutorial sample and has been modified to work with ZK using ZK Spring Security. You can download the example codes from ZK Spring Essentials Google Code s ...logged in they will be presented a login page. On successful login Spring Security will also verify if they have the specific roles assigned to them that will8 KB (1,059 words) - 13:20, 19 January 2022
- ...jects/spring-boot Spring Boot] and Spring Security. (You can read a Spring Security guide: [https://spring.io/guides/gs/securing-web/ Securing a Web Applicatio The example code mentioned here only works for Spring Security 4/5.8 KB (938 words) - 01:22, 20 December 2022
File:ZK Security Report.pdf A brief overview of ZK Framework security features(625 KB) - 04:15, 1 October 2013File:Spring-security-anonymous.png (502 × 173 (6 KB)) - 06:51, 14 March 2013File:Spring-security-user.png (502 × 172 (6 KB)) - 06:51, 14 March 2013File:Spring-security-editor.png (502 × 173 (6 KB)) - 06:51, 14 March 2013File:Enhanced Security Framework.png (455 × 423 (76 KB)) - 10:30, 5 March 2024File:Spring security integration use case diagram.png (630 × 510 (26 KB)) - 07:20, 26 February 2013- #REDIRECT [[Small Talks/2007/January/ZK + Acegi Security System]]65 bytes (8 words) - 01:30, 21 September 2010
- #REDIRECT [[Small Talks/2010/April/Making Spring Security Work with ZK]]72 bytes (10 words) - 08:48, 20 September 2010
- ...ion facility. In this article, we will show you how to configure the Acegi Security System with ZK. ...ere will be problems for a new event thread to get the Acegi's ThreadLocal security context. This is the first issue we have to handle.7 KB (954 words) - 01:30, 21 September 2010
- |version=ZK 6.5.X, Spring Security 3.1.2 ...ough URL, it's not obvious for application developer to realise how Spring Security can be adapted with a specific Ajax request handling mechanism of an Ajax f20 KB (2,824 words) - 03:33, 15 March 2013
- ::Applicable to Spring Security 3.0 and later ...egi Security System. There has been questions regarding how to make Spring Security work with ZK Ajax framework and here is an example that demonstrates how to29 KB (4,043 words) - 07:17, 8 December 2010
- #REDIRECT [[Small Talks/2010/April/Ajax Based Login with ZK and Spring Security System]]88 bytes (13 words) - 06:03, 20 September 2010
- #REDIRECT [[Small Talks/2010/April/Customize Your ZK Pages Per Spring Security Authority Roles]]96 bytes (13 words) - 07:35, 20 September 2010
- ...ble to ZK Spring Integration Library 3.0RC (zkspring-core.jar and zkspring-security.jar) or later. ::Applicable to Spring Security 3.0+11 KB (1,662 words) - 02:09, 8 December 2010
- ::Applicable to Spring Security 3.0 and later This is the third articles in a series regarding how to make Spring Security 2.0.x work with ZK Ajax framework. In the previous two articles ([[Small_Ta9 KB (1,295 words) - 06:57, 7 December 2010
- ...it's most likely you have a service that intercepts HTTP requests (e.g. a security filter) and redirects the AU request to a login page. First, configure your SSO server or the security filter to return the response code '''403 Forbidden''' instead of 302 for t4 KB (555 words) - 04:37, 2 February 2024
- ...iki/Cross-site_scripting Cross-site scripting] (XSS) is a type of computer security vulnerability typically found in web applications that enables malicious at5 KB (669 words) - 07:11, 16 February 2024
- 3 KB (514 words) - 10:24, 5 February 2024
- 5 KB (813 words) - 04:10, 2 February 2024
- ...to make ZK applications secure. ZK is designed to provide enterprise-grade security. However, there are still several discussions worth to take a look. You can371 bytes (45 words) - 04:43, 1 October 2013
- In the following sections, we are going to describe how to integrate security frameworks with ZK.209 bytes (19 words) - 02:00, 20 March 2013
- ...K 10.0.0 and later, this blocking service is enabled by default to enhance security. This service is an additional filter to improve security but does not replace verifying roles and permissions in your business logic4 KB (575 words) - 07:14, 18 April 2024
- 2 KB (336 words) - 10:35, 19 January 2022
- #REDIRECT [[ZK Developer's Guide/Advanced ZK/Security Tips/Block Request for Inaccessible Widgets]]99 bytes (13 words) - 11:33, 2 September 2010
- ...iki/Cross-site_scripting Cross-site scripting] (XSS) is a type of computer security vulnerability typically found in web applications that enables malicious at3 KB (421 words) - 07:38, 21 March 2017
- #REDIRECT [[ZK Developer's Guide/Advanced ZK/Security Tips/Cross-site scripting]]81 bytes (10 words) - 11:32, 2 September 2010
- Spring Security 2.0 and 3.0 build on Acegi Security's solid foundations, adding many new features. The framework provides a com ...nload zkspringsec302.war]<br/> The tutorial sample is borrowed from Spring Security 3.0, and has been modified to work with ZK seamlessly.11 KB (1,357 words) - 10:38, 19 January 2022
- ZK is designed to provide enterprise-grade security. However, there are still several issues worth to take a look.366 bytes (44 words) - 03:44, 18 November 2010
- #REDIRECT [[ZK Developer's Guide/Advanced ZK/Security Tips]]60 bytes (8 words) - 11:32, 2 September 2010
- ...to logon to the application. By default this Ajax login popup uses Spring Security's default login page to be displayed in ZK's hilighted window component. In ...></code> element. In addition to that you only need to configure ZK Spring Security to use a custom login page to be displayed in Ajax login popup window. It c5 KB (703 words) - 13:21, 19 January 2022
- ...rity tutorial sample and has been modified to work with ZK using ZK Spring Security. You can download the example codes from ZK Spring Essentials Google Code Now to make Ajax login popup work you need to configure certain ZK Spring Security custom filters in your Spring Configuration as shown below8 KB (1,098 words) - 13:21, 19 January 2022
- ZK Spring Security provides utilities to check permissions in ZK applications for both Java an207 bytes (20 words) - 08:50, 13 December 2022
Page text matches
- ===ZK + Spring Security === *[[Small_Talks/2010/April/Making_Spring_Security_Work_with_ZK | Making Spring Security Work with ZK]]591 bytes (78 words) - 06:53, 7 December 2010
- :[[ZK Spring Essentials/Working with ZK Spring/Working with ZK Spring Security]] ...Spring/Working with ZK Spring Security/Secure a ZK Application with Spring Security]]1 KB (155 words) - 06:25, 22 January 2019
- === Prerequisite for using Spring Security with ZK Spring 1.1.0 release === To make Spring Security work with ZK properly, you have to copy the following jars to <code>/WEB-IN3 KB (425 words) - 10:39, 19 January 2022
- ...integration with Spring Core) and ZK Spring Security (utilities for Spring Security). The Following sections will go into details of both modules and demonstra469 bytes (52 words) - 08:17, 22 January 2019
File:ZKSpringEssentials SecurityExampleListAccounts1.jpg Spring Security Secure component events example screen(537 × 311 (56 KB)) - 02:20, 23 February 2011- ...to logon to the application. By default this Ajax login popup uses Spring Security's default login page to be displayed in ZK's hilighted window component. In ...></code> element. In addition to that you only need to configure ZK Spring Security to use a custom login page to be displayed in Ajax login popup window. It c5 KB (703 words) - 13:21, 19 January 2022
File:ZK Security Report.pdf A brief overview of ZK Framework security features(625 KB) - 04:15, 1 October 2013- #REDIRECT [[Small Talks/2007/January/ZK + Acegi Security System]]65 bytes (8 words) - 01:30, 21 September 2010
- #REDIRECT [[Small Talks/2010/April/Making Spring Security Work with ZK]]72 bytes (10 words) - 08:48, 20 September 2010
- #REDIRECT [[Small Talks/2010/April/Ajax Based Login with ZK and Spring Security System]]88 bytes (13 words) - 06:03, 20 September 2010
- #REDIRECT [[Small Talks/2010/April/Customize Your ZK Pages Per Spring Security Authority Roles]]96 bytes (13 words) - 07:35, 20 September 2010
- In the following sections, we are going to describe how to integrate security frameworks with ZK.209 bytes (19 words) - 02:00, 20 March 2013
- = What is Content security policy?= Content-security-policy (CSP) is a security standard introduced to prevent XSS attacks (cross-site scripting) and other3 KB (376 words) - 10:24, 5 February 2024
- ZK Spring Security provides utilities to check permissions in ZK applications for both Java an207 bytes (20 words) - 08:50, 13 December 2022
- #REDIRECT [[ZK Developer's Guide/Advanced ZK/Security Tips/Cross-site scripting]]81 bytes (10 words) - 11:32, 2 September 2010
- #REDIRECT [[ZK Developer's Guide/Advanced ZK/Security Tips/Block Request for Inaccessible Widgets]]99 bytes (13 words) - 11:33, 2 September 2010
- #REDIRECT [[ZK Developer's Guide/Advanced ZK/Security Tips]]60 bytes (8 words) - 11:32, 2 September 2010
- ...ustomized jQuery library. Replacing that bundled jQuery in ZK to solve its security vulnerability isn't an option. This is because ZK and jQuery are deeply int | 1.10.2 with security patches1 KB (160 words) - 03:51, 21 April 2022
- ...y as introduced in earlier section when we described features of ZK Spring Security. ...p to login to the application which requires certain configuration in your security configuration file. Below we show what configurations are done to achieve t5 KB (590 words) - 05:55, 25 February 2011
- ZK is designed to provide enterprise-grade security. However, there are still several issues worth to take a look.366 bytes (44 words) - 03:44, 18 November 2010
- Spring Security 2.0 and 3.0 build on Acegi Security's solid foundations, adding many new features. The framework provides a com ...nload zkspringsec302.war]<br/> The tutorial sample is borrowed from Spring Security 3.0, and has been modified to work with ZK seamlessly.11 KB (1,357 words) - 10:38, 19 January 2022
- ...rity tutorial sample and has been modified to work with ZK using ZK Spring Security. You can download the example codes from ZK Spring Essentials Google Code s ...logged in they will be presented a login page. On successful login Spring Security will also verify if they have the specific roles assigned to them that will8 KB (1,059 words) - 13:20, 19 January 2022
- ...to make ZK applications secure. ZK is designed to provide enterprise-grade security. However, there are still several discussions worth to take a look. You can371 bytes (45 words) - 04:43, 1 October 2013
- ...tion security that presents a list of the 10 most critical web application security risks. The most recent edition of this document was published in 2013. ...t in full, or other abundant web resources for more information about each security risk. Depending on the nature of vulnerability, a front-end framework such5 KB (686 words) - 06:34, 17 January 2018
- ...rity tutorial sample and has been modified to work with ZK using ZK Spring Security. You can download the example codes from ZK Spring Essentials Google Code Now to make Ajax login popup work you need to configure certain ZK Spring Security custom filters in your Spring Configuration as shown below8 KB (1,098 words) - 13:21, 19 January 2022
- = OWASP Top 10 Security Concerns In 2021 = ...0 list serves as a crucial tool in raising awareness about web application security, highlighting the ten most significant risks.7 KB (1,014 words) - 16:35, 15 May 2024
- ...jects/spring-boot Spring Boot] and Spring Security. (You can read a Spring Security guide: [https://spring.io/guides/gs/securing-web/ Securing a Web Applicatio The example code mentioned here only works for Spring Security 4/5.8 KB (938 words) - 01:22, 20 December 2022
- This is a security measure to prevent XXE attacks using <code><!DOCTYPE ...></code> as vector.355 bytes (52 words) - 04:01, 19 January 2024
- ...it's most likely you have a service that intercepts HTTP requests (e.g. a security filter) and redirects the AU request to a login page. First, configure your SSO server or the security filter to return the response code '''403 Forbidden''' instead of 302 for t4 KB (555 words) - 04:37, 2 February 2024
- ...tion security that presents a list of the 10 most critical web application security risks. The most recent edition of this document was published in 2017. ...t in full, or other abundant web resources for more information about each security risk. Depending on the nature of vulnerability, a front-end framework such6 KB (861 words) - 03:28, 10 May 2024
- ...e small, short-term personal loans that are extended with no collateral or security deposits.<br>Again, the guarantor must have good credit and must be receivi3 KB (534 words) - 15:16, 19 January 2013
- ...n_with_ZK_and_Spring_Security_System | Ajax Based Login with ZK and Spring Security System]]. It's doesn't include yet appgen to generate the redundant stuffs. Spring security 3.0.07 KB (818 words) - 03:34, 22 November 2011
- ...ion facility. In this article, we will show you how to configure the Acegi Security System with ZK. ...ere will be problems for a new event thread to get the Acegi's ThreadLocal security context. This is the first issue we have to handle.7 KB (954 words) - 01:30, 21 September 2010
- ::Applicable to Spring Security 3.0 and later This is the third articles in a series regarding how to make Spring Security 2.0.x work with ZK Ajax framework. In the previous two articles ([[Small_Ta9 KB (1,295 words) - 06:57, 7 December 2010
- ZK Spring Security provides features to check a user's role and permissions so that you can de ZK Spring Security provides 2 ways to access user roles and permissions in a ZK application.5 KB (637 words) - 09:20, 13 December 2022
- ...additional features for integrating with Spring core framework and Spring Security. Highlight features are exposed in Spring-managed beans within ZK framework724 bytes (93 words) - 01:30, 14 December 2022
- ...ble to ZK Spring Integration Library 3.0RC (zkspring-core.jar and zkspring-security.jar) or later. ::Applicable to Spring Security 3.0+11 KB (1,662 words) - 02:09, 8 December 2010
- '''ZK Spring Security''' <artifactId>zkspring-security</artifactId>3 KB (409 words) - 04:30, 17 January 2024
- :[[ZK Developer's Reference/Integration/Security]] :[[ZK Developer's Reference/Integration/Security/Spring Security]]15 KB (1,817 words) - 08:04, 17 May 2024
- ...the current web application is using. If a user wants to hide the info in security consideration, he can specify this library property as <code>false</code>.817 bytes (118 words) - 10:38, 4 May 2022
- <import resource="security-config.xml" /> Since this example uses Spring core, Spring Security and Spring Webmvc in addition to Spring Webflow we have a separate configur7 KB (803 words) - 13:21, 19 January 2022
- |version=ZK 6.5.X, Spring Security 3.1.2 ...ough URL, it's not obvious for application developer to realise how Spring Security can be adapted with a specific Ajax request handling mechanism of an Ajax f20 KB (2,824 words) - 03:33, 15 March 2013
- ...t. The period differs based upon the debt's total amount. There are always security issues when buying or applying for things over the Internet. But it is not4 KB (672 words) - 04:04, 11 January 2013
- * Brief introduce Spring Security. Spring Security is an application framework that provides security services for J2EE-based enterprise software application. It is a popular an23 KB (3,113 words) - 05:17, 13 July 2023
- ...pgrade to the latest available versions (older versions contain a critical security vulnerability). Notice: never put security sensitive files in the directory specified here, since they can be accessed4 KB (606 words) - 08:36, 4 September 2023
- ...C has been tested to work with with ZK 5.0.1, Spring core 3.0.2 and Spring Security 3.0.2 releases.1 KB (193 words) - 10:38, 19 January 2022
- * Ignore some AU requests (such as [[ZK Developer's Reference/Security Tips/Block Request for Inaccessible Widgets|hostile requests]])2 KB (234 words) - 04:33, 5 February 2024
- ...troduce how you can secure your ZK applications using Apache Shiro, a Java security framework. ...ptography, session management and so on. It is a comprehensive application security framework and especially useful for securing your web applications based on12 KB (1,728 words) - 04:19, 20 January 2022
- ...K 10.0.0 and later, this blocking service is enabled by default to enhance security. This service is an additional filter to improve security but does not replace verifying roles and permissions in your business logic4 KB (575 words) - 07:14, 18 April 2024
- ::Applicable to Spring Security 3.0 and later ...egi Security System. There has been questions regarding how to make Spring Security work with ZK Ajax framework and here is an example that demonstrates how to29 KB (4,043 words) - 07:17, 8 December 2010