@@ -90,8 +90,8 @@ two more sub-scopes:
|
90 | 90 | Pre-Authorization Decisions
|
91 | 91 | ---------------------------
|
92 | 92 |
|
93 |
| -For pre-authorization decisions, that is decisions before any method, or |
94 |
| -secure action is invoked, we rely on the proven AccessDecisionManager service |
| 93 | +For pre-authorization decisions, that is decisions made before any secure method (or |
| 94 | +secure action) is invoked, we rely on the proven AccessDecisionManager service |
95 | 95 | that is also used for reaching authorization decisions based on roles. Just
|
96 | 96 | like roles, the ACL system adds several new attributes which may be used to
|
97 | 97 | check for different permissions.
|
@@ -142,10 +142,9 @@ Built-in Permission Map
|
142 | 142 | Permission Attributes vs. Permission Bitmasks
|
143 | 143 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
144 | 144 |
|
145 |
| -Attributes are used by the AccessDecisionManager, just like roles are |
146 |
| -attributes used by the AccessDecisionManager. Often, these attributes |
147 |
| -represent in fact an aggregate of integer bitmasks. Integer bitmasks on the |
148 |
| -other hand, are used by the ACL system internally to efficiently store your |
| 145 | +Attributes are used by the AccessDecisionManager, just like roles. Often, these |
| 146 | +attributes represent in fact an aggregate of integer bitmasks. Integer bitmasks on |
| 147 | +the other hand, are used by the ACL system internally to efficiently store your |
149 | 148 | users' permissions in the database, and perform access checks using extremely
|
150 | 149 | fast bitmask operations.
|
151 | 150 |
|
|
0 commit comments