Hi Alex!
Thanks for the feedback.
Alex Karasulu wrote:
There are different levels at which anonymous access is controlled
depending on how an anonymous user comes into the system. At a bare
minimum in embedded mode the authentication interceptor needs some
configuration on how to handle users that are anonymous. Then if LDAP
access is enabled over the wire then this configuration information is
needed by the protocol services as well. I guess this can be extracted
from the directory service but some times there may need to be some
override - don't remember exactly.
This makes perfectly sense. I was a little bit confused, because some
configuration combinations do not work in the branch as I had expected.
What I want to do is finish up a few things in this second phase that
effects how authentication may be done and review the authentication
interceptor and this configuration stuff. Something here is not right
and I have not had the time to really sit down and figure it all out.
Perhaps we should just suspend this one parameter's documentation until
these issues are clearly resolved or understood?
No problem. Thanks again for clarifying this. I will add a TODO item in
the documentation.
Greetings,
Stefan