> Are there any widely used approaches or best practices that we 
> can follow?


The acegi security framework offers a widely used approach:

http://acegisecurity.sourceforge.net/


- Dave

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to