On Jun 21, 2009, at 9:40 PM, Stephan Richter wrote:
> On Sunday 21 June 2009, Jim Fulton wrote:
> +1. Sounds really good!
> BTW, I would love to hear about a practical example for overriding
> other than turning off security altogether.
- Use a Python-based proxy that's good enough for supporting access
control in trusted code. (It wouldn't protect against devious
untrusted code, but most applications don't really need to run
- Use a better system for managing checkers.
Probably the most important feature is disabling proxy-based
protection for applications that don't need an access control model or
that use a non-proxy-based approach.
Zope-Dev maillist - Zope-Dev@zope.org
** No cross posts or HTML encoding! **
(Related lists -