After read both articles on the site and the security chapter in the
upcoming book I am still questioning what the best practice is for roles
based authentication.
I am looking for a good way to make roles based decisions inside of an
actions execution method.
Any one have any good ideas or examples?
Nathan
-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
Stripes-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/stripes-users