Good question Bob, This system may eventually be implemented for the government department I work for in Queensland, Australia. This project is a pilot one which will involve four separate district offices in four different cities. The department has policies on data security which includes authenticating individual users to a database. As this is a requirement I can't avoid I wanted to find a way to implement it even in the proof-of-concept stage.
User authentication can be implemented on the middle tier in Tomcat but I don't think this will satisfy the dept. requirements. That being the case, my plan was to let the database decide if a user can get into the site. If they are authenticated to the db then they have access to the site. One other advantage of db authentication which will be important in this case is the separation of database roles. Users will have access to update only the tables they are approved to access. Jeffery S. Eaton ************************************************************ Opinions contained in this e-mail do not necessarily reflect the opinions of the Queensland Department of Main Roads, Queensland Transport or Maritime Safety Queensland, or endorsed organisations utilising the same infrastructure. If you have received this electronic mail message in error, please immediately notify the sender and delete the message from your computer. ************************************************************ --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]