Allow me to refine my question. I'm wondering if the Shale filter is intercepting requests to the container. Do I need to adjust the filter mapping? Is there an FM somewhere that I should R?
-----Original Message----- From: James Reynolds [mailto:[EMAIL PROTECTED] Sent: Friday, March 03, 2006 3:02 PM To: Struts Users Mailing List Subject: Shale & Container Managed Security I'm a newbie setting up container managed security for a basic Shale-blank application. For my first attempt, I'm trying a simple BASIC authentication but I'm having troubles so I'm trying to rule out the unknowns. My question for this list is, does Shale have an impact on traditional Container Managed Security Methods? Thanks --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED] --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]