[EMAIL PROTECTED] wrote:
If you have \A/secure/.*\Z=ROLE_SUPERVISOR,ROLE_TELLER in
I want to get rid of this line in filterInvocationInterceptor. If ROLE_ABC
is included in this line, then things work out smoothly, but then it means
that in future If I will be adding a new role in descriptor I have
Ben Wrote :
If you have \A/secure/.*\Z=ROLE_SUPERVISOR,ROLE_TELLER in
filterInvocationInterceptor, it is entirely correct that a user only
holding ROLE_ABC should receive a 404 error. Add a comma and the
ROLE_ABC if you want to allow users holding ROLE_ABC to access the
/secure URIs. If that doesn'
[EMAIL PROTECTED] wrote:
I am using my own JdbcDaoImpl for authentication of user from database.
When i run the program with my own roles say ROLE_ABC, I get a 404 (
resources access forbidden ) error.
I have been advised to diable the userchaching so that
DaoAuthenticationProvider will always get
I am using my own JdbcDaoImpl for authentication of user from database.
When i run the program with my own roles say ROLE_ABC, I get a 404 (
resources access forbidden ) error.
I have been advised to diable the userchaching so that
DaoAuthenticationProvider will always get UserDetail from database.