We utilized a Hibernate interceptor in our solution, though that is only a
part of the solution (the interceptor didn't give us everything we needed).
- Andy
On Wednesday 09 February 2005 09:40 pm, Ben Alex wrote:
Gavin Terrill wrote:
We recently adopted Acegi Security for one of our
In our model, the lazy approach wouldn't have bought us too much since we have
rich clients, meaning that all service invocations happen remotely. One of
our goals was to prevent sensitive information from even being transmitted to
the client. This means that we would have had to apply the
] PostInvocation and Hibernate
Sessions
We developed our current ACL type system before Acegi had its ACL
system,
and
planned for this behavior from the beginning (we work with Hibernate
as
well). Our system has these abilities:
1. Property level ACLs. If the user does not have