Testimonials

Hidden Flaw in Audit Logging w/ Hibernate Interceptor & ACEGI

We’ve recently came across a fatal problem in our audit logging facility where Acegi returns a different user other than the actual user. It’s a little hard to replicate because it happens only when multiple users are accessing the system. In summary, audit logs were associated to other users because Acegi SecurityContextHolder is returning incorrect…

Read more...

Audit Logging via Hibernate Interceptor (1/2)

July 2008 Blogged by Allan Tan

Audit Logging via Hibernate Interceptor (1/2)

One common requirement in developing enterprise applications is to ensure audit logs are available for data security and traceability. Who made the changes, when and where. Such requirement is not only dictated by corporate IT policies but is also required by government laws. Considering most enterprise applications have at least 50 domain objects…

Read more...

Audit Logging via Hibernate Interceptor (2/2)

July 2008 Blogged by Allan Tan

Audit Logging via Hibernate Interceptor (2/2)

One common requirement in developing enterprise applications is to ensure audit logs are available for data security and traceability. Who made the changes, when and where. Such requirement is not only dictated by corporate IT policies but is also required by government laws. This is a continuation of “Audit Logging via Hibernate Interceptor”.

Read more...

Contact Us


!-- GOOGLE ANALYTICS -->