On 03/05/2010 11:09 AM, Marley wrote:
> 
>> Application implementation features are so sufficiently disparate that
>> they discourage specific toolkit implementations.
> 
> So how does one implement Authentication/Authorization?  Roll your
> own?
The short answer (besides Q.E.D.) is yes.

I don't remember your earlier posts. You might have mentioned that
you've reviewed the "best practices" recommendations at the Google
Groups home page. If you haven't, I'd start there.

>  what about things like Spring Security?  No one should use that?

I'm guessing that a search of the list archives will uncover some useful
advice.

-- 
You received this message because you are subscribed to the Google Groups 
"Google Web Toolkit" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/google-web-toolkit?hl=en.

Reply via email to