Re: [Acegisecurity-developer] PostInvocation and Hibernate Sessions

2005-02-10 Thread Andy Depue
We utilized a Hibernate interceptor in our solution, though that is only a part of the solution (the interceptor didn't give us everything we needed). - Andy On Wednesday 09 February 2005 09:40 pm, Ben Alex wrote: Gavin Terrill wrote: We recently adopted Acegi Security for one of our

Re: [Acegisecurity-developer] PostInvocation and Hibernate Sessions

2005-02-10 Thread Andy Depue
In our model, the lazy approach wouldn't have bought us too much since we have rich clients, meaning that all service invocations happen remotely. One of our goals was to prevent sensitive information from even being transmitted to the client. This means that we would have had to apply the

Re: [Acegisecurity-developer] PostInvocation and Hibernate Sessions

2005-02-09 Thread Andy Depue
] PostInvocation and Hibernate Sessions We developed our current ACL type system before Acegi had its ACL system, and planned for this behavior from the beginning (we work with Hibernate as well). Our system has these abilities: 1. Property level ACLs. If the user does not have