How to design tomcats security constraints to restrict manipulation in any form? #4277
Replies: 1 comment 2 replies
-
If you want to allow queries (including queries sent using POST) but not SPARQL updates, you should make sure that both GET and POST access is granted on As an aside I've just noticed that that section 3 you mentioned is a partly out of date: it still mentions the use of the SYSTEM repository for creation and deletion of repositories. This is now obsolete. Instead, repositories are created and deleted by means of a PUT or DELETE, respectively, on See https://rdf4j.org/documentation/reference/rest-api/ for an overview of all endpoints and what they do. |
Beta Was this translation helpful? Give feedback.
-
I'm trying to limit access to the rdf4j server based on credentials according to section 3 on this page.
If I now execute the following code with a non authorized user, I'm getting a "302 Forbidden" in return, as it should be.
However, the following code that uses a SPARQL query works. I guess, all SPARQL code simply always results in a POST.
How could I design the security constraints to properly disallow manipulation or deletion, no matter it's appearance.
Security constraints in the web.xml of rdf4j-server:
Beta Was this translation helpful? Give feedback.
All reactions