wicket's security model is completely generic

see IAuthorizationStrategy - it is very abstract and thus can be used to
implement any kind of authorization

wicket-auth is just an example that implements basic role-based model

see wicket-stuff wasp and swarm projects

http://wicketstuff.org/confluence/display/STUFFWIKI/Wicket-Security

-igor


On 6/21/07, craigdd <[EMAIL PROTECTED]> wrote:


Is wicket security based only on role based authorization or could it
somehow
be used with a more traditional ACL type of file / logic.

-Craig
--
View this message in context:
http://www.nabble.com/wicket-security-and-acl-files-tf3960558.html#a11239024
Sent from the Wicket - User mailing list archive at Nabble.com.


-------------------------------------------------------------------------
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
_______________________________________________
Wicket-user mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/wicket-user

-------------------------------------------------------------------------
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
_______________________________________________
Wicket-user mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/wicket-user

Reply via email to