I'm afraid we'll have to make sure that NTLM authenticated
connections are either not re-used at all, or only by someone
with the appropriate credentials. And especially in the proxy
scenario, re-use would really improve performance.

I would agree.  We want to be sure that connections are not reused
inappropriately.  Assuming we want to reuse them, then NTLM
credentials will have to somehow become part of the connection's
state.

Mike

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to