Easy enough. Do you have a suggestion as to what properties should be protected, or should have getters for?
On 2/2/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > > It's a pity so many of the instance variables and methods in the JAAS > Provider are declared private and aren't protected. > I'd like to be able to sub-class some of it for a Kerberos Provider. > The Sun GSS-API implementation uses the JAAS login modules under the hood > for the initial TGT requests. I'd prefer to not reinvent the wheel if > possible. > > Anthony Geoghegan > Framework Architect > DeCare Systems Ireland, > Building 1, > University Technology Centre, > Curraheen Road, > Cork, Ireland > phone: +353 21 4925 172 > fax: +353 21 4925 166 > web: http://www.decaresystems.ie > blog: http://blog.decaresystems.ie/wordpress/ ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://sel.as-us.falkag.net/sel?cmd=lnk&kid3432&bid#0486&dat1642 _______________________________________________ Home: http://acegisecurity.org Acegisecurity-developer mailing list Acegisecurity-developer@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/acegisecurity-developer