Am I missing something? Not verifying the integrity of a security token creates a vulnerability, right?
Have you quantified the performance impact of Spring Security? Anthony > > Agreed. Initially I had spec'd it out based on Spring Security. But Neelkanth > felt token based approach is better for performance where we check only for > presence of Token but not its Integrity > > > - Tushar >
