RE: TC security/impersonation question

2010-05-27 Thread dB .
sday, May 26, 2010 7:06 PM To: users@tomcat.apache.org Subject: RE: TC security/impersonation question Hi, Just a dumb question from a newbe but if I implement any type of security with TC then under what identity will the invoked WS stack object execute the request? Specifically,

Re: TC security/impersonation question

2010-05-27 Thread Pid *
On 27 May 2010, at 00:06, Timothy Taylor wrote: > Hi, > Just a dumb question from a newbe but if I implement any type of > security with TC then under what identity will the invoked WS stack > object execute the request? Specifically, if I enable Kerberos > authentication between the requesting a

RE: TC security/impersonation question

2010-05-26 Thread Timothy Taylor
Hi, Just a dumb question from a newbe but if I implement any type of security with TC then under what identity will the invoked WS stack object execute the request? Specifically, if I enable Kerberos authentication between the requesting application and TC does this guarantee the WS stack