The first pattern I’ll discuss in this book enables you to manipulate the HTTP request and response objects both before and after they’re processed by either a Java servlet or a JSP page. This gives you a great amount of flexibility to customize a base application without requiring modifications to the application code itself. For instance, let’s say you have two different applications, each with their own security model. You’d like to avoid making users log in to both systems and maintain multiple login IDs. Although there are many complicated solutions to this problem, filters provide a way to intercept each request and perform the necessary security negotiation between the different systems (see Figure 6-1).
KeywordsFilter Manager Filter Class Public Void Security Negotiation Custom Filter
Unable to display preview. Download preview PDF.