Description
Rather than invent our own security context, we should use the one Java provides.
Moreover since we perform security checks based on the Connection and Session of the user, we should add these as "Principals" of the current subject.
Rather than invent our own security context, we should use the one Java provides.
Moreover since we perform security checks based on the Connection and Session of the user, we should add these as "Principals" of the current subject.