Am I missing something?  Not verifying the integrity of a security token 
creates a vulnerability, right?

Have you quantified the performance impact of Spring Security?

Anthony

> 
> Agreed. Initially I had spec'd it out based on Spring Security. But Neelkanth 
> felt token based approach is better for performance where we check only for 
> presence of Token but not its Integrity
> 
> 
> - Tushar
> 

Reply via email to