Search results
From Documentation
Page title matches
- ...tion security that presents a list of the 10 most critical web application security risks. The most recent edition of this document was published in 2013. ...t in full, or other abundant web resources for more information about each security risk. Depending on the nature of vulnerability, a front-end framework such5 KB (686 words) - 06:34, 17 January 2018
- ...tion security that presents a list of the 10 most critical web application security risks. The most recent edition of this document was published in 2017. ...t in full, or other abundant web resources for more information about each security risk. Depending on the nature of vulnerability, a front-end framework such6 KB (878 words) - 10:25, 5 February 2024
- = What is Content security policy?= Content-security-policy (CSP) is a security standard introduced to prevent XSS attacks (cross-site scripting) and other3 KB (376 words) - 10:24, 5 February 2024
- * Brief introduce Spring Security. Spring Security is an application framework that provides security services for J2EE-based enterprise software application. It is a popular an23 KB (3,113 words) - 05:17, 13 July 2023
- [https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src#unsafe_eval_expressions See the MDN CSP documentation for [https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src#unsafe_inline_script See the MDN CSP documentation for mo10 KB (1,306 words) - 10:24, 5 February 2024
- ZK Spring Security provides features to check a user's role and permissions so that you can de ZK Spring Security provides 2 ways to access user roles and permissions in a ZK application.5 KB (637 words) - 09:20, 13 December 2022
- ...rity tutorial sample and has been modified to work with ZK using ZK Spring Security. You can download the example codes from ZK Spring Essentials Google Code s ...logged in they will be presented a login page. On successful login Spring Security will also verify if they have the specific roles assigned to them that will8 KB (1,059 words) - 13:20, 19 January 2022
- ...jects/spring-boot Spring Boot] and Spring Security. (You can read a Spring Security guide: [https://spring.io/guides/gs/securing-web/ Securing a Web Applicatio The example code mentioned here only works for Spring Security 4/5.8 KB (938 words) - 01:22, 20 December 2022
- #REDIRECT [[Small Talks/2007/January/ZK + Acegi Security System]]65 bytes (8 words) - 01:30, 21 September 2010
- #REDIRECT [[Small Talks/2010/April/Making Spring Security Work with ZK]]72 bytes (10 words) - 08:48, 20 September 2010
- |version=ZK 6.5.X, Spring Security 3.1.2 ...ough URL, it's not obvious for application developer to realise how Spring Security can be adapted with a specific Ajax request handling mechanism of an Ajax f20 KB (2,824 words) - 03:33, 15 March 2013
- ...ion facility. In this article, we will show you how to configure the Acegi Security System with ZK. ...ere will be problems for a new event thread to get the Acegi's ThreadLocal security context. This is the first issue we have to handle.7 KB (954 words) - 01:30, 21 September 2010
- ::Applicable to Spring Security 3.0 and later ...egi Security System. There has been questions regarding how to make Spring Security work with ZK Ajax framework and here is an example that demonstrates how to29 KB (4,043 words) - 07:17, 8 December 2010
- #REDIRECT [[Small Talks/2010/April/Ajax Based Login with ZK and Spring Security System]]88 bytes (13 words) - 06:03, 20 September 2010
- #REDIRECT [[Small Talks/2010/April/Customize Your ZK Pages Per Spring Security Authority Roles]]96 bytes (13 words) - 07:35, 20 September 2010
- ...ble to ZK Spring Integration Library 3.0RC (zkspring-core.jar and zkspring-security.jar) or later. ::Applicable to Spring Security 3.0+11 KB (1,662 words) - 02:09, 8 December 2010
- ::Applicable to Spring Security 3.0 and later This is the third articles in a series regarding how to make Spring Security 2.0.x work with ZK Ajax framework. In the previous two articles ([[Small_Ta9 KB (1,295 words) - 06:57, 7 December 2010
- 3 KB (514 words) - 10:24, 5 February 2024
- ...iki/Cross-site_scripting Cross-site scripting] (XSS) is a type of computer security vulnerability typically found in web applications that enables malicious at5 KB (669 words) - 07:11, 16 February 2024
- ...it's most likely you have a service that intercepts HTTP requests (e.g. a security filter) and redirects the AU request to a login page. First, configure your SSO server or the security filter to return the response code '''403 Forbidden''' instead of 302 for t4 KB (555 words) - 04:37, 2 February 2024
Page text matches
- ===ZK + Spring Security === *[[Small_Talks/2010/April/Making_Spring_Security_Work_with_ZK | Making Spring Security Work with ZK]]591 bytes (78 words) - 06:53, 7 December 2010
- === Prerequisite for using Spring Security with ZK Spring 1.1.0 release === To make Spring Security work with ZK properly, you have to copy the following jars to <code>/WEB-IN3 KB (425 words) - 10:39, 19 January 2022
- ...integration with Spring Core) and ZK Spring Security (utilities for Spring Security). The Following sections will go into details of both modules and demonstra469 bytes (52 words) - 08:17, 22 January 2019
- ...to logon to the application. By default this Ajax login popup uses Spring Security's default login page to be displayed in ZK's hilighted window component. In ...></code> element. In addition to that you only need to configure ZK Spring Security to use a custom login page to be displayed in Ajax login popup window. It c5 KB (703 words) - 13:21, 19 January 2022
- #REDIRECT [[Small Talks/2007/January/ZK + Acegi Security System]]65 bytes (8 words) - 01:30, 21 September 2010
- #REDIRECT [[Small Talks/2010/April/Making Spring Security Work with ZK]]72 bytes (10 words) - 08:48, 20 September 2010
- #REDIRECT [[Small Talks/2010/April/Ajax Based Login with ZK and Spring Security System]]88 bytes (13 words) - 06:03, 20 September 2010
- #REDIRECT [[Small Talks/2010/April/Customize Your ZK Pages Per Spring Security Authority Roles]]96 bytes (13 words) - 07:35, 20 September 2010
- In the following sections, we are going to describe how to integrate security frameworks with ZK.209 bytes (19 words) - 02:00, 20 March 2013
- = What is Content security policy?= Content-security-policy (CSP) is a security standard introduced to prevent XSS attacks (cross-site scripting) and other3 KB (376 words) - 10:24, 5 February 2024
- ZK Spring Security provides utilities to check permissions in ZK applications for both Java an207 bytes (20 words) - 08:50, 13 December 2022
- #REDIRECT [[ZK Developer's Guide/Advanced ZK/Security Tips/Cross-site scripting]]81 bytes (10 words) - 11:32, 2 September 2010
- #REDIRECT [[ZK Developer's Guide/Advanced ZK/Security Tips/Block Request for Inaccessible Widgets]]99 bytes (13 words) - 11:33, 2 September 2010
- #REDIRECT [[ZK Developer's Guide/Advanced ZK/Security Tips]]60 bytes (8 words) - 11:32, 2 September 2010
- ...ustomized jQuery library. Replacing that bundled jQuery in ZK to solve its security vulnerability isn't an option. This is because ZK and jQuery are deeply int | 1.10.2 with security patches1 KB (160 words) - 03:51, 21 April 2022
- ...y as introduced in earlier section when we described features of ZK Spring Security. ...p to login to the application which requires certain configuration in your security configuration file. Below we show what configurations are done to achieve t5 KB (590 words) - 05:55, 25 February 2011
- ZK is designed to provide enterprise-grade security. However, there are still several issues worth to take a look.366 bytes (44 words) - 03:44, 18 November 2010
- Spring Security 2.0 and 3.0 build on Acegi Security's solid foundations, adding many new features. The framework provides a com ...nload zkspringsec302.war]<br/> The tutorial sample is borrowed from Spring Security 3.0, and has been modified to work with ZK seamlessly.11 KB (1,357 words) - 10:38, 19 January 2022
- ...rity tutorial sample and has been modified to work with ZK using ZK Spring Security. You can download the example codes from ZK Spring Essentials Google Code s ...logged in they will be presented a login page. On successful login Spring Security will also verify if they have the specific roles assigned to them that will8 KB (1,059 words) - 13:20, 19 January 2022
- ...to make ZK applications secure. ZK is designed to provide enterprise-grade security. However, there are still several discussions worth to take a look. You can371 bytes (45 words) - 04:43, 1 October 2013