Right: an integer id is not sensitive information.  The problem arises 
(as in your original example), when a malicious user can edit the URL to 
change the id to another that he is not allowed to see, and your 
application lets him see it.  It's that last part you have to prevent.  
After using the authorization system to determine who the user is, you 
need an authentication system to guarantee that users only see data they 
are authorized to see.

--Ned.

John Shaffer wrote:
> On 7/14/07, Rogelio <[EMAIL PROTECTED]> wrote:
>   
>> yet.  I guess I was
>> thinking that even if the user was logged in, the URL still would be
>> showing potentially
>> sensitive info.  I was thinking maybe I needed to create some random
>> sequence of
>> letters/numbers, store that in a model field and use it as the pk
>>     
>
> Use the default:
> http://www.djangoproject.com/documentation/model-api/#automatic-primary-key-fields
>
> A student's row number isn't sensitive.
>
> >
>
>
>   

-- 
Ned Batchelder, http://nedbatchelder.com


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Django users" group.
To post to this group, send email to django-users@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/django-users?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to