User identity confirmation Authentication and Authorize Authorization
When the web user accesses the protected resources on the web server, it is usually necessary to pass through two steps. (Extracted from .NET framework document)
1. User identity confirmation Authentication
Make sure the user is not a fake. The application obtains the credentials of the user (various forms of identity, such as user name and password) and verify those credentials through certain licensing agencies. If these credentials are valid, the entity submitted to these credentials is considered as identified by authentication.
2. Authorize Authorization
Access access is restricted by granting or rejecting specific permissions for verified identity.
The resource protection strategy of the ASP.NET and Java web framework follows this model: corresponding to the protected resources, define a set of roles, users, and allowed operations. Operation is called http-method in the Java web framework, called VERB in ASP.NET, which represents HTTP methods such as HTTP GET, HTTP POST.
According to the servlet2.4 specification, the Login Form for the web page of the Java Web framework should be written in accordance with the following case. Note that the value of the Form's Action property should be j_security_check.