http://anil-identity.blogspot.com/2007/04/tip-3-token-based-perimeter.html

What you are doing is something called as "Perimeter Security". Please take a 
look at how GenericHeaderAuthenticator is implemented. You will need to do 
something like it.

View the original post : 
http://www.jboss.com/index.html?module=bb&op=viewtopic&p=4093542#4093542

Reply to the post : 
http://www.jboss.com/index.html?module=bb&op=posting&mode=reply&p=4093542
_______________________________________________
jboss-user mailing list
[email protected]
https://lists.jboss.org/mailman/listinfo/jboss-user

Reply via email to