It would probably be easier to prevent users from viewing those pages using
a filter.  If you are using AuthenticatedSystem, you might be able to tap
into the login_required function.  An example filter would be like

<.. in your controller class ..>
before_filter :login_required, :except => [:show]

Hope that helps.

On Fri, Jul 24, 2009 at 8:41 PM, Rilindo Foster <[email protected]> wrote:

> Working through the Users and Authentication of Learning Rails book (great
> book, code needs to be proof-read in a few cases, though), I came across
> this:
> There's still one leftover that may be worth addressing, depending on your
> security needs. The authorization? method has secured the data, and the
> view no longer shows the user options they can't really use, but if a user
> knows the URL for the edit form, it will still open. It's a GET request,
> after all. This is a good reason to make sure that these forms don't display
> any information that isn't publicly available through other means. If this
> is an issue, it may be worth the effort of adding authorization checks to
> every controller method that could spring a leak.
>
> Any good reason why I do that instead of adding the checks to the view
> pages, like?
>
> *<% if current_user.admin? %>*
>
> *<display page>*
>
> *
> *
>
> *<% else %>*
>
> *<don't display page>*
>
> *
>
> <% end%>
>
>
>  - Rilindo
>
> *
>
>
> >
>


-- 
=====================
Jim
http://www.thepeoplesfeed.com/contribute

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "Ruby 
on Rails: Talk" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/rubyonrails-talk?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to