On Jul 31, 2010, at 2:13 AM, Daniel Henze wrote:
> Thanks Kalle and Pierce for your feedback, it's interesting to read a little
> more about other experiences. I can completely understand the login form
> issue, something I stopped considering after a short period of time. The
> tynamo project
Thanks Kalle and Pierce for your feedback, it's interesting to read a
little more about other experiences. I can completely understand the
login form issue, something I stopped considering after a short period
of time. The tynamo project has some really interesting projects and it
seems securit
I followed a similar path. I started trying to use tapestry-spring-security,
couldn't
figure out how to customize the login form, and switch to Kalle's
tapestry-security project, and I'm now a happy customer, and I ended up
contributing back to the tapestry-security project some components.
I'm completely biased of course so feel free to disregard, but: I used
to be a long time user of Acegi Security (now Spring Security) but
finally got fed up with the peculiarities of the framework and the
inherent inflexibility for supporting some of the more elaborate
security models. I looked aro
Well, I did have a glance at it the time I was looking for a security
solution. But to me it appeared the easiest to go with
tapestry-spring-security, mainly due to the ease of initial integration.
The documentation of tynamos tapestry-seems to be quite good as well.
From looking at the example
Hi
Have you looked in to tynamo security project ?
2010/7/30 Daniel Henze
> Hi Christophe,
>
> yes, I have read that article before, but admit that I could not grasp all
> the details by that time and therefore decided to go with
> tapestry-spring-security. A lot of knowledge has been gained in
Hi Christophe,
yes, I have read that article before, but admit that I could not grasp
all the details by that time and therefore decided to go with
tapestry-spring-security. A lot of knowledge has been gained in between
though, so I will re-read and think about option 3 (re-implementing
secur
Hi
Have already read this article [1] from Howard, it explains how to secure an
application via Annotations and shows the pipeline as well
[1]
http://tapestryjava.blogspot.com/2009/12/securing-tapestry-pages-with.html
2010/7/30 Daniel Henze
> Hi everyone,
>
> I created a Service, contributede