John Beynon wrote:

 > As for Hal's proposal becoming part of the fusebox spec, it could
 > happen but I think it's more likely to become a 'best practices' - I
 > know he's got something new up his sleeve at the moment. Since
 > everyone has their own stand point on security coming up with a
 > 'standard fusebox' methodology would be a huge challenge.

Understood.

Anyway, assuming that I wish to follow Hal's proposal, is the 
implementation of the code that should be responsible for traversing the 
circuit path (reading the FBX_Permissions.cfm files and updating the 
fusebox.permissions structure along the way) available somewhere or 
would I have to write my own?

 > And yes, apart from hard coding your userpermissions, looks like
 > you're on the right lines,
 >
 > There ya go, I answered all your questions,

Thank you :)

-- 
Ney Andr� de Mello Zunino
Media and Technology Laboratory
Campus Computing Centre
United Nations University

==^================================================================
This email was sent to: [email protected]

EASY UNSUBSCRIBE click here: http://topica.com/u/?bUrFMa.bV0Kx9
Or send an email to: [EMAIL PROTECTED]

T O P I C A -- Register now to manage your mail!
http://www.topica.com/partner/tag02/register
==^================================================================

Reply via email to