Frank W. Zammetti wrote:
Not sure I have an answer for that :) My guess would be because of the
first letter in the acronynm: Lightweight. Otherwise, your question seems
reasonable to me.
Yep, the 'lightweight' is certainly a key factor. LDAP is optimized toward
high read volume, low write
Not sure I have an answer for that :) My guess would be because of the
first letter in the acronynm: Lightweight. Otherwise, your question seems
reasonable to me.
--
Frank W. Zammetti
Founder and Chief Software Architect
Omnytex Technologies
http://www.omnytex.com
On Fri, July 15, 2005 6:41 am
LDAP is commonly used for security systems (for example: M$ Active
Directory and Novell's NDS are both LDAP implementations), and so
using them for applications (instead of a database) lets you leverage
existing security settings so you do not have to duplicate them.
Larry
On 7/15/05, Adam Hardy
Frank W. Zammetti on 14/07/05 17:39, wrote:
We have completely externalized security from all our applications and
have built a fairly robust Security Framework, on top of J2EE security and
LDAP. Further, we are now taking customization and adding it in.
Currently, once a user is authenticated
As far as security and authorization goes, where I work we very much view
it as, I suppose, a ring around the Olympic rings... perhaps a 100m track?
:)
We have completely externalized security from all our applications and
have built a fairly robust Security Framework, on top of J2EE security and
Martin Gainty wrote:
Boris-
I see Security as implemented by RingBearer Frodo in Lord of the Rings
The caretaker of the ring travels thru all domains and access to the
other dimension (portal which contains final results) regardless of
any domain he travels thru
Begreife?
Martin-
Since I'm
On 7/14/05, Ted Husted <[EMAIL PROTECTED]> wrote:
> One way to address customization is to build the notion of a user
> profile into the application. The user profile can contain the
> information each ring might require to customize the user experience.
Which to further the olympics metaphor, wou
On 7/14/05, Borislav Sabev <[EMAIL PROTECTED]> wrote:
> I fully agree here, that's why I consider Authorization as a ring that
> intersect all other rings, and this means it depend on each of them.
> But it fact better metaphor for it is that is a small ring inside every
> other ring, i.e. not seen
Leon Rosenberg wrote:
---Ursprüngliche Nachricht-
Von: Borislav Sabev [mailto:[EMAIL PROTECTED]
Gesendet: Mittwoch, 13. Juli 2005 18:54
An: Struts Users Mailing List
Betreff: [OT] olipmic rings metaphor
How do you classify Security and Authorization issues in this
metaphor?
In my
> -Ursprüngliche Nachricht-
> Von: Borislav Sabev [mailto:[EMAIL PROTECTED]
> Gesendet: Mittwoch, 13. Juli 2005 18:54
> An: Struts Users Mailing List
> Betreff: [OT] olipmic rings metaphor
>
> How do you classify Security and Authorization issues in this
&
> -Ursprüngliche Nachricht-
> Von: Borislav Sabev [mailto:[EMAIL PROTECTED]
> Gesendet: Mittwoch, 13. Juli 2005 18:54
> An: Struts Users Mailing List
> Betreff: [OT] olipmic rings metaphor
>
> How do you classify Security and Authorization issues in this
&
On 7/13/05, Borislav Sabev <[EMAIL PROTECTED]> wrote:
> How do you classify Security and Authorization issues in this metaphor?
>
> In my current project I have troubles since code that is related somehow
> to Authorization is spread over all "rings. Still it's difficult to me
> to have a clear un
: "Borislav Sabev" <[EMAIL PROTECTED]>
To: "Struts Users Mailing List"
Sent: Wednesday, July 13, 2005 12:54 PM
Subject: [OT] olipmic rings metaphor
Ted Husted wrote:
In my own work, I tend to think of an enterprise-grade application as
a set of overlapping rin
Ted Husted wrote:
In my own work, I tend to think of an enterprise-grade application as
a set of overlapping rings, like the Olympics logo.
* http://www.olympic.org/
In the Blue ring live the view members, like custom tags or UI
components, and the HTTP request and response objects. This is th
14 matches
Mail list logo