Re: Programmatic Security

2006-07-01 Thread Bob Hall
--- John Caron <[EMAIL PROTECTED]> wrote: > I guess im fishing around for anyone who has thought > about or > implemented "programmatic security" instead of / in > addition to > "container managed security". > > Thanks for your time. > John, You might want to consider Turbine instead of "ro

Re: Programmatic Security

2006-06-30 Thread John Caron
Nicholas Sushkin wrote: On Wednesday 28 June 2006 14:05, John Caron wrote: I assume I need to get a session established, so that the authorization need only be done once. It would also be nice if I recieve a unauthorized request, that I could pass it to Tomcat's 401 challenge and authentic

Re: Programmatic Security

2006-06-28 Thread Nicholas Sushkin
On Wednesday 28 June 2006 14:05, John Caron wrote: > I assume I need to get a session established, so that the authorization > need only be done once.  It would also be nice if I recieve a > unauthorized request, that I could pass it to Tomcat's 401 challenge and > authentication mechanism. Howev

Re: Programmatic Security

2006-06-28 Thread John Caron
Pid wrote: It really depends on what you're trying to achieve, maybe you could elaborate? Do you need to restrict access to filesystem resources, servlets, jsps, images, DB content, or something else? Ok, I am creating a data server that is controlled by an XML configuration "catalog" of dat

Re: Programmatic Security

2006-06-28 Thread Pid
It really depends on what you're trying to achieve, maybe you could elaborate? Do you need to restrict access to filesystem resources, servlets, jsps, images, DB content, or something else? Martin Gainty wrote: > Good Evening All- > > The best way is to put up a Jsp / servlet which itself has

Re: Programmatic Security

2006-06-27 Thread Martin Gainty
Good Evening All- The best way is to put up a Jsp / servlet which itself has the username/password information to let you behind the firewall There are a ton of https and firewalls you can install and configure to your hearts content But none would be more secure and safe than controlling authe