wicket's security model is completely generic
see IAuthorizationStrategy - it is very abstract and thus can be used to
implement any kind of authorization
wicket-auth is just an example that implements basic role-based model
see wicket-stuff wasp and swarm projects
http://wicketstuff.org/confluence/display/STUFFWIKI/Wicket-Security
-igor
On 6/21/07, craigdd <[EMAIL PROTECTED]> wrote:
Is wicket security based only on role based authorization or could it
somehow
be used with a more traditional ACL type of file / logic.
-Craig
--
View this message in context:
http://www.nabble.com/wicket-security-and-acl-files-tf3960558.html#a11239024
Sent from the Wicket - User mailing list archive at Nabble.com.
-------------------------------------------------------------------------
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
_______________________________________________
Wicket-user mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/wicket-user
-------------------------------------------------------------------------
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
_______________________________________________
Wicket-user mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/wicket-user