sday, May 26, 2010 7:06 PM
To: users@tomcat.apache.org
Subject: RE: TC security/impersonation question
Hi,
Just a dumb question from a newbe but if I implement any type of security with
TC then under what identity will the invoked WS stack object execute the
request? Specifically,
On 27 May 2010, at 00:06, Timothy Taylor
wrote:
> Hi,
> Just a dumb question from a newbe but if I implement any type of
> security with TC then under what identity will the invoked WS stack
> object execute the request? Specifically, if I enable Kerberos
> authentication between the requesting a
Hi,
Just a dumb question from a newbe but if I implement any type of security with
TC then under what identity will the invoked WS stack object execute the
request? Specifically, if I enable Kerberos authentication between the
requesting application and TC does this guarantee the WS stack