16.05.2017 11:26, Vlad Khorsun wrote: > Do you have a list of "bad" decisions in auth design ?
1) Mapping done by engine. 2) Tie between auth and wire encryption. This leads that encapsulation of authentication in auth plugins to be broken. > Do you have something better to offer here ? I gave up offering of anything here years ago. -- WBR, SD. ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot Firebird-Devel mailing list, web interface at https://lists.sourceforge.net/lists/listinfo/firebird-devel
