If the application that is making use of Shiro authorisation is running in a JEE container that has security providers why can't Shiro simply use the asserted principal and role(s) from the JEE container security providers?
David. -- View this message in context: http://shiro-user.582556.n2.nabble.com/Delegate-authentication-to-container-tp7578779.html Sent from the Shiro User mailing list archive at Nabble.com.
