| layout | pattern | ||
|---|---|---|---|
| title | Intercepting Filter | ||
| folder | intercepting-filter | ||
| permalink | /patterns/intercepting-filter/ | ||
| pumlid | RSfB3i8m303Hgy014k-vZN5DQkIuaJ_q-fGzkz7JtCL8Q-DolUsPAnu0ZcSVadizAzZfi6JBJiS4qJenqU6D7smRXmnh2pFPBM1YN05o_KwyKcoqb-ZFEEcVz_BPLqtz0W00 | ||
| categories | Behavioral | ||
| tags |
|
Provide pluggable filters to conduct necessary pre-processing and post-processing to requests from a client to a target
Use the Intercepting Filter pattern when
- a system uses pre-processing or post-processing requests
- a system should do the authentication/ authorization/ logging or tracking of request and then pass the requests to corresponding handlers
- you want a modular approach to configuring pre-processing and post-processing schemes
