On 25 Nov, 2005, at 8:17 am, Jorge Godoy wrote:
I just want to be extra clear about this: you won't be able to access an instance of SecureObject by any means unless the current identity satisfies the criteria you've specified. This means you can't access it under the covers or outside of a request (where there is no identity).
You can apply whatever decorators you want on the methods of the Toxicologia instance. So each method could have additional restrictions. And Toxicologia could have SecureObjects as well. However, access to exposed methods of Toxicologia and any SecureObjects would have to satisfy the authorisation requirements for Toxicologia. -- Jeff Watkins "Computers are like Old Testament gods; lots of rules and no mercy." -- Joseph Campbell |

