On Monday 22 June 2009, Jim Fulton wrote:
> 2 examples:
>
> - Use a Python-based proxy that's good enough for supporting access  
> control in trusted code. (It wouldn't protect against devious  
> untrusted code, but most applications don't really need to run  
> untrusted code.)
>
> - Use a better system for managing checkers.
>
> Probably the most important feature is disabling proxy-based  
> protection for applications that don't need an access control model or  
> that use a non-proxy-based approach.

Thanks, that helps me to put a context around the discussion.

Regards,
Stephan
-- 
Entrepreneur and Software Geek
Google me. "Zope Stephan Richter"
_______________________________________________
Zope-Dev maillist  -  Zope-Dev@zope.org
http://mail.zope.org/mailman/listinfo/zope-dev
**  No cross posts or HTML encoding!  **
(Related lists - 
 http://mail.zope.org/mailman/listinfo/zope-announce
 http://mail.zope.org/mailman/listinfo/zope )

Reply via email to