Changes

Jump to: navigation, search

Abstraction

979 bytes added, 21:54, 13 June 2009
m
Reverted edits by 62.175.249.249 (Talk); changed back to last version by Jrochkind
[[Category:Patterns]]
MrlhKH <a href="httpGeneral rule://ducolsjalscdAbstract things out as much as makes sense= ==Specific rule: Abstract the living crap out of your authentication scheme.com/">ducolsjalscd<== Look, pretty much everyone with anything worth protecting already has an auth/authZ infrastructure in place. Sometimes an extensive, perhaps multi-institutional infrastructure. One that isn’t going to be bypassed without, say, getting fired. So if you’re going to require people to log in, make sure you make that process as abstract as you possibly can, both in algorithm and in code. Have a>singleton class that’s easily subclassed to represent your user, [url=http://rojbzsvgcyeaand call it exclusively.com/]rojbzsvgcyea[/url]Make sure that your URIs are easily separated into those that require auth and those that don’t, [link=http://grglypwccdpmfor simple use of mod_rewrite or whatnot to redirect to authentication.com/]grglypwccdpm[/link]Make sure it’s easy to hook into (or work around) AJAX links that might require authentication that has expired. And for the love of god, http:don’t stuff username//jljxmhddoyuspassword information into a cookie if you’re doing web work. Use a session and session key. Any auth scheme that I can spoof is no auth scheme at all, because I’m an idiot and not even trying hard.com/

Navigation menu