for a comparison between auth-roles and swarm/wasp, take a look at http://wicketstuff.org/confluence/display/STUFFWIKI/Security+Framework+Comparison
gerolf On Jan 14, 2008 11:14 PM, C. Bergström <[EMAIL PROTECTED]> wrote: > > On Mon, 2008-01-14 at 13:51 -0800, Dan Kaplan wrote: > > What? Really? F***. Can you please elaborate? Did I waste every > second > > of the time I spent looking at the examples on wicketstuff? I applied > these > > examples to my webapp. Did I implement some type of "pretend" > authorization > > strategy? > > http://wicketstuff.org/confluence/display/STUFFWIKI/Wicket-Security > +Examples > > Sources are available here.. > > https://wicket-stuff.svn.sourceforge.net/svnroot/wicket-stuff/trunk/wicket-security-examples > > maybe this is more in the ballpark of what you were expecting? > > ./C > > > --------------------------------------------------------------------- > To unsubscribe, e-mail: [EMAIL PROTECTED] > For additional commands, e-mail: [EMAIL PROTECTED] > >
