There are fundamentally two architectures.

Standalone and online. Any discussion we can have about the merits and demerits of both have been repeated ad-nausea for every application since the birth of the Internet.

If we try to boil the ocean on the first pass, the project is doomed from the beginning. Can you image what would have happened if Linus Torvalds had tried to release Red Hat as a replacement to Minux?

Get something that works well and that installs well on a local machine. Refactor it so that the business tier, the presentation tier and the model tier are distinct.

Drop it on a disconnected appserver and add an additional presentation tier to prove that the refactoring is sufficient. It won't be, so count on additional refactoring.

Now you have a functional solution that is worth debating security/privacy/convience issues about taking online.

The worst case scenario is, you have a solution that works for you, and that others can install and that will work for them.

Pushing security concerns into the application logic itself, is IMHO, absolutely poor design!!! Security and security policies are cross-cutting concerns that should be done declaratively in a security policy manager, or at worst, in the appserver.

As a ward member, do you really want to have to log in and validate against every piece of functionality restricted to members on the church website. Ex: Once I log in once, switching to the ward webmaster mode doesn't require a new authentication. Why? Because the authentication is done at the middleware layer, not the individual application layer.

--
A. Rick Anderson

_______________________________________________
Ldsoss mailing list
[email protected]
http://lists.ldsoss.org/mailman/listinfo/ldsoss

Reply via email to