On Tue, Dec 21, 2010 at 6:12 PM, Eelco Hillenius
<eelco.hillen...@gmail.com>wrote:

> > - using database roles to restrict access to data, and not relying wholly
> on application enforced security
>
> So if you want to determine whether user X can see button Y, you have
> to query the database for particular role membership?


Since he says "wholly", I'm assuming he means that the DB stands as the
"last resort" security.  Ideally your application rules will apply the
security constraints correctly.  But, if someone finds a way to punch a hole
in that security (i.e. change a primary key in the URL, which shouldn't be
there anyway without security around it, but sometimes people do this, which
leaves an app-level security vulnerability), the DB rules should kick in and
disallow what you were trying (hacking) to do.

-- 
Jeremy Thomerson
http://wickettraining.com
*Need a CMS for Wicket?  Use Brix! http://brixcms.org*

Reply via email to