On Monday 22 June 2009, Jim Fulton wrote:
> 2 examples:
> - Use a Python-based proxy that's good enough for supporting access
> control in trusted code. (It wouldn't protect against devious
> untrusted code, but most applications don't really need to run
> untrusted code.)
> - Use a better system for managing checkers.
> Probably the most important feature is disabling proxy-based
> protection for applications that don't need an access control model or
> that use a non-proxy-based approach.
Thanks, that helps me to put a context around the discussion.
Entrepreneur and Software Geek
Google me. "Zope Stephan Richter"
Zope-Dev maillist - Zope-Dev@zope.org
** No cross posts or HTML encoding! **
(Related lists -