-
Classes Class Description org.apache.shiro.authc.credential.Md2CredentialsMatcher since 1.1 - use the HashedCredentialsMatcher directly and set itshashAlgorithmName
property.org.apache.shiro.authc.credential.Md5CredentialsMatcher since 1.1 - use the HashedCredentialsMatcher directly and set itshashAlgorithmName
property.org.apache.shiro.authc.credential.Sha1CredentialsMatcher since 1.1 - use the HashedCredentialsMatcher directly and set itshashAlgorithmName
property.org.apache.shiro.authc.credential.Sha256CredentialsMatcher since 1.1 - use the HashedCredentialsMatcher directly and set itshashAlgorithmName
property.org.apache.shiro.authc.credential.Sha384CredentialsMatcher since 1.1 - use the HashedCredentialsMatcher directly and set itshashAlgorithmName
property.org.apache.shiro.authc.credential.Sha512CredentialsMatcher since 1.1 - use the HashedCredentialsMatcher directly and set itshashAlgorithmName
property.org.apache.shiro.cas.CasFilter replaced with Shiro integration in buji-pac4j.org.apache.shiro.cas.CasRealm replaced with Shiro integration in buji-pac4j.org.apache.shiro.cas.CasSubjectFactory replaced with Shiro integration in buji-pac4j.org.apache.shiro.cas.CasToken replaced with Shiro integration in buji-pac4j.org.apache.shiro.config.IniFactorySupport use Shiro'sEnvironment
mechanisms instead.org.apache.shiro.config.IniSecurityManagerFactory use Shiro'sEnvironment
mechanisms instead.org.apache.shiro.crypto.hash.AbstractHash in Shiro 1.1 in favor of using the concreteSimpleHash
implementation directly.org.apache.shiro.realm.ldap.DefaultLdapContextFactory replaced by theJndiLdapContextFactory
implementation. This implementation will be removed prior to Shiro 2.0org.apache.shiro.realm.ldap.JndiLdapRealm Renamed toDefaultLdapRealm
, this class will be removed prior to 2.0org.apache.shiro.util.JavaEnvironment This class is no longer used in Shiro and will be removed in the next major version.org.apache.shiro.web.config.WebIniSecurityManagerFactory use Shiro'sEnvironment
mechanisms instead.org.apache.shiro.web.servlet.IniShiroFilter in 1.2 in favor of using theShiroFilter
-
Exceptions Exceptions Description org.apache.shiro.cas.CasAuthenticationException replaced with Shiro integration in buji-pac4j.
-
Fields Field Description org.apache.shiro.web.mgt.DefaultWebSecurityManager.HTTP_SESSION_MODE org.apache.shiro.web.mgt.DefaultWebSecurityManager.NATIVE_SESSION_MODE
-
Methods Method Description org.apache.shiro.authc.credential.HashedCredentialsMatcher.getSalt(AuthenticationToken) since Shiro 1.1. Hash salting is now expected to be based on if theAuthenticationInfo
returned from theRealm
is aSaltedAuthenticationInfo
instance and itsgetCredentialsSalt()
method returns a non-null value. This method and the 1.0 behavior still exists for backwards compatibility if theRealm
does not returnSaltedAuthenticationInfo
instances, but it is highly recommended thatRealm
implementations that support hashed credentials start returningSaltedAuthenticationInfo
instances as soon as possible. This is because salts should always be obtained from the stored account information and never be interpreted based on user/Subject-entered data. User-entered data is easier to compromise for attackers, whereas account-unique (and secure randomly-generated) salts never disseminated to the end-user are almost impossible to break. This method will be removed in Shiro 2.0.org.apache.shiro.authc.credential.HashedCredentialsMatcher.isHashSalted() since Shiro 1.1. Hash salting is now expected to be based on if theAuthenticationInfo
returned from theRealm
is aSaltedAuthenticationInfo
instance and itsgetCredentialsSalt()
method returns a non-null value. This method and the 1.0 behavior still exists for backwards compatibility if theRealm
does not returnSaltedAuthenticationInfo
instances, but it is highly recommended thatRealm
implementations that support hashed credentials start returningSaltedAuthenticationInfo
instances as soon as possible. This is because salts should always be obtained from the stored account information and never be interpreted based on user/Subject-entered data. User-entered data is easier to compromise for attackers, whereas account-unique (and secure randomly-generated) salts never disseminated to the end-user are almost impossible to break. This method will be removed in Shiro 2.0.org.apache.shiro.authc.credential.HashedCredentialsMatcher.setHashSalted(boolean) since Shiro 1.1. Hash salting is now expected to be based on if theAuthenticationInfo
returned from theRealm
is aSaltedAuthenticationInfo
instance and itsgetCredentialsSalt()
method returns a non-null value. This method and the 1.0 behavior still exists for backwards compatibility if theRealm
does not returnSaltedAuthenticationInfo
instances, but it is highly recommended thatRealm
implementations that support hashed credentials start returningSaltedAuthenticationInfo
instances as soon as possible. This is because salts should always be obtained from the stored account information and never be interpreted based on user/Subject-entered data. User-entered data is easier to compromise for attackers, whereas account-unique (and secure randomly-generated) salts never disseminated to the end-user are almost impossible to break. This method will be removed in Shiro 2.0.org.apache.shiro.guice.web.ShiroWebModule.addFilterChain(String, Key<? extends Filter>...) org.apache.shiro.guice.web.ShiroWebModule.config(Key<T>, String) org.apache.shiro.mgt.DefaultSecurityManager.bind(Subject) in favor ofsave(subject)
.org.apache.shiro.mgt.DefaultSecurityManager.unbind(Subject) in Shiro 1.2 in favor ofDefaultSecurityManager.delete(org.apache.shiro.subject.Subject)
org.apache.shiro.mgt.DefaultSubjectFactory.newSubjectInstance(PrincipalCollection, boolean, String, Session, SecurityManager) since 1.2 - overrideDefaultSubjectFactory.createSubject(org.apache.shiro.subject.SubjectContext)
directly if you need to instantiate a customSubject
class.org.apache.shiro.realm.ldap.DefaultLdapContextFactory.getLdapContext(String, String) theDefaultLdapContextFactory.getLdapContext(Object, Object)
method should be used in all cases to ensure more than String principals and credentials can be used. Shiro no longer calls this method - it will be removed before the 2.0 release.org.apache.shiro.realm.ldap.DefaultLdapContextFactory.setSearchBase(String) this attribute existed, but was never used in Shiro 1.x. It will be removed prior to Shiro 2.0.org.apache.shiro.realm.ldap.JndiLdapContextFactory.getLdapContext(String, String) theJndiLdapContextFactory.getLdapContext(Object, Object)
method should be used in all cases to ensure more than String principals and credentials can be used. Shiro no longer calls this method - it will be removed before the 2.0 release.org.apache.shiro.realm.ldap.LdapContextFactory.getLdapContext(String, String) theLdapContextFactory.getLdapContext(Object, Object)
method should be used in all cases to ensure more than String principals and credentials can be used.org.apache.shiro.util.CollectionUtils.isEmpty(PrincipalCollection) Use PrincipalCollection.isEmpty() directly.org.apache.shiro.web.env.EnvironmentLoader.determineWebEnvironmentClass(ServletContext) This method is not longer used by Shiro, and will be removed in future versions, useEnvironmentLoader.determineWebEnvironment(ServletContext)
orEnvironmentLoader.determineWebEnvironment(ServletContext)
org.apache.shiro.web.mgt.DefaultWebSecurityManager.getSessionMode() org.apache.shiro.web.mgt.DefaultWebSecurityManager.setSessionMode(String) since 1.2org.apache.shiro.web.mgt.DefaultWebSubjectFactory.newSubjectInstance(PrincipalCollection, boolean, String, Session, ServletRequest, ServletResponse, SecurityManager) since 1.2 - overrideDefaultWebSubjectFactory.createSubject(org.apache.shiro.subject.SubjectContext)
directly if you need to instantiate a customSubject
class.org.apache.shiro.web.servlet.OncePerRequestFilter.shouldNotFilter(ServletRequest) in favor of overridingOncePerRequestFilter.isEnabled(javax.servlet.ServletRequest, javax.servlet.ServletResponse)
for custom behavior. This method will be removed in Shiro 2.0.
-
Constructors Constructor Description org.apache.shiro.UnavailableSecurityManagerException(String, Throwable) This constructor is NOT used by Shiro directly, and will be removed in the future.