Allow me to refine my question. I'm wondering if the Shale filter is
intercepting requests to the container.  Do I need to adjust the filter
mapping?  Is there an FM somewhere that I should R? 

-----Original Message-----
From: James Reynolds [mailto:[EMAIL PROTECTED] 
Sent: Friday, March 03, 2006 3:02 PM
To: Struts Users Mailing List
Subject: Shale & Container Managed Security


I'm a newbie setting up container managed security for a basic
Shale-blank application.  For my first attempt, I'm trying a simple
BASIC authentication but I'm having troubles so I'm trying to rule out
the unknowns.

My question for this list is, does Shale have an impact on traditional
Container Managed Security Methods?

Thanks


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to