for a comparison between auth-roles and swarm/wasp, take a look at
http://wicketstuff.org/confluence/display/STUFFWIKI/Security+Framework+Comparison

  gerolf

On Jan 14, 2008 11:14 PM, C. Bergström <[EMAIL PROTECTED]> wrote:

>
> On Mon, 2008-01-14 at 13:51 -0800, Dan Kaplan wrote:
> > What?  Really?  F***.  Can you please elaborate?  Did I waste every
> second
> > of the time I spent looking at the examples on wicketstuff?  I applied
> these
> > examples to my webapp.  Did I implement some type of "pretend"
> authorization
> > strategy?
>
> http://wicketstuff.org/confluence/display/STUFFWIKI/Wicket-Security
> +Examples
>
> Sources are available here..
>
> https://wicket-stuff.svn.sourceforge.net/svnroot/wicket-stuff/trunk/wicket-security-examples
>
> maybe this is more in the ballpark of what you were expecting?
>
> ./C
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>

Reply via email to