Hey, that is easier. I'll have to save this.

Thanks!

On Jul 24, 2009, at 8:54 PM, James Englert wrote:

> It would probably be easier to prevent users from viewing those  
> pages using a filter.  If you are using AuthenticatedSystem, you  
> might be able to tap into the login_required function.  An example  
> filter would be like
>
> <.. in your controller class ..>
> before_filter :login_required, :except => [:show]
>
> Hope that helps.
>
> On Fri, Jul 24, 2009 at 8:41 PM, Rilindo Foster <[email protected]>  
> wrote:
> Working through the Users and Authentication of Learning Rails book  
> (great book, code needs to be proof-read in a few cases, though), I  
> came across this:
>
> There's still one leftover that may be worth addressing, depending  
> on your security needs. The authorization? method has secured the  
> data, and the view no longer shows the user options they can't  
> really use, but if a user knows the URL for the edit form, it will  
> still open. It's a GET request, after all. This is a good reason to  
> make sure that these forms don't display any information that isn't  
> publicly available through other means. If this is an issue, it may  
> be worth the effort of adding authorization checks to every  
> controller method that could spring a leak.
>
> Any good reason why I do that instead of adding the checks to the  
> view pages, like?
>
> <% if current_user.admin? %>
> <display page>
>
> <% else %>
> <don't display page>
> <% end%>
>
>  - Rilindo
>
>
>
>
>
> -- 
> =====================
> Jim
> http://www.thepeoplesfeed.com/contribute
>
> >


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "Ruby 
on Rails: Talk" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/rubyonrails-talk?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to