On Monday 22 June 2009, Jim Fulton wrote: > 2 examples: > > - Use a Python-based proxy that's good enough for supporting access > control in trusted code. (It wouldn't protect against devious > untrusted code, but most applications don't really need to run > untrusted code.) > > - Use a better system for managing checkers. > > Probably the most important feature is disabling proxy-based > protection for applications that don't need an access control model or > that use a non-proxy-based approach.
Thanks, that helps me to put a context around the discussion. Regards, Stephan -- Entrepreneur and Software Geek Google me. "Zope Stephan Richter" _______________________________________________ Zope-Dev maillist - Zope-Dev@zope.org http://mail.zope.org/mailman/listinfo/zope-dev ** No cross posts or HTML encoding! ** (Related lists - http://mail.zope.org/mailman/listinfo/zope-announce http://mail.zope.org/mailman/listinfo/zope )