> Are there any widely used approaches or best practices that we > can follow?
The acegi security framework offers a widely used approach: http://acegisecurity.sourceforge.net/ - Dave --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]