Easy enough. Do you have a suggestion as to what properties should be
protected, or should have getters for?

On 2/2/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
>
> It's a pity so many of the instance variables and methods in the JAAS
> Provider are declared private and aren't protected.
> I'd like to be able to sub-class some of it for a Kerberos Provider.
> The Sun GSS-API implementation uses the JAAS login modules under the hood
> for the initial TGT requests.  I'd prefer to not reinvent the wheel if
> possible.
>
> Anthony Geoghegan
>  Framework Architect
>  DeCare Systems Ireland,
>  Building 1,
>  University Technology Centre,
>  Curraheen Road,
>  Cork, Ireland
>  phone: +353 21 4925 172
>  fax: +353 21 4925 166
>  web: http://www.decaresystems.ie
>  blog: http://blog.decaresystems.ie/wordpress/


-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems?  Stop!  Download the new AJAX search engine that makes
searching your log files as easy as surfing the  web.  DOWNLOAD SPLUNK!
http://sel.as-us.falkag.net/sel?cmd=lnk&kid3432&bid#0486&dat1642
_______________________________________________
Home: http://acegisecurity.org
Acegisecurity-developer mailing list
Acegisecurity-developer@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/acegisecurity-developer

Reply via email to