Hi Darshana/ Maduranga,

I have been checked this scenario in kernal rc2 pack
(wso2is-5.1.0-kernel-4.2.0-SNAPSHOT) and I could not reproduce the same as
it is. Now, user can login to console either with RW/read only domains[1]
or without domain.

So, can I assume that the user (login permission granted) from secondary
user store which same ldap used for R/W & Read only can have permission to
login?

[1]
RW domain
-------------------
[2015-10-14 14:57:33,191] DEBUG
{org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -
 Authenticating user testnew2
[2015-10-14 14:57:33,192] DEBUG
{org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Cache hit.
Using DN uid=testnew2,ou=People,ou=WSO2,o=Opensource,dc=ITIndustry,dc=sl
[2015-10-14 14:57:33,203] DEBUG
{org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  User:
uid=testnew2,ou=People,ou=WSO2,o=Opensource,dc=ITIndustry,dc=sl is
authnticated: true
[2015-10-14 14:57:33,205]  INFO
{org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} -
 'RWLDAP.com/testnew2@carbon.super [-1234]' logged in at [2015-10-14
14:57:33,205+0530]
[2015-10-14 14:57:33,209] DEBUG
{org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
 Authorization cache miss for username : RWLDAP.com/testnew2 resource
/permission action : ui.execute
[2015-10-14 14:57:33,209] DEBUG
{org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
 Allowed roles for the ResourceID: /permission Action: ui.execute


read only domain
-------------------------
[2015-10-14 15:01:04,319] DEBUG
{org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -
 Authenticating user testnew2
[2015-10-14 15:01:04,320] DEBUG
{org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Cache hit.
Using DN uid=testnew2,ou=People,ou=WSO2,o=Opensource,dc=ITIndustry,dc=sl
[2015-10-14 15:01:04,327] DEBUG
{org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  User:
uid=testnew2,ou=People,ou=WSO2,o=Opensource,dc=ITIndustry,dc=sl is
authnticated: true
[2015-10-14 15:01:04,328] DEBUG
{org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
 Authorization cache miss for username : ROLDAP.com/testnew2 resource
/permission/admin/login action : ui.execute
[2015-10-14 15:01:04,328] DEBUG
{org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
 Allowed roles for the ResourceID: /permission/admin/login Action:
ui.execute
[2015-10-14 15:01:04,329] DEBUG
{org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  role:
INTERNAL/everyone
[2015-10-14 15:01:04,329] DEBUG
{org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  role:
admin
[2015-10-14 15:01:04,329] DEBUG
{org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  role:
RWLDAP.COM/glassrole
[2015-10-14 15:01:04,329] DEBUG
{org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  Roles
which have permission for resource : /permission/admin/login action :
ui.execute
[2015-10-14 15:01:04,329] DEBUG
{org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  Role
:  INTERNAL/everyone
[2015-10-14 15:01:04,329] DEBUG
{org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  Role
:  admin
[2015-10-14 15:01:04,329] DEBUG
{org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  Role
:  RWLDAP.COM/glassrole
[2015-10-14 15:01:04,330] DEBUG
{org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
 ROLDAP.com/testnew2 user is in role :  INTERNAL/everyone
[2015-10-14 15:01:04,332]  INFO
{org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} -
 'ROLDAP.com/testnew2@carbon.super [-1234]' logged in at [2015-10-14
15:01:04,331+0530]
[2015-10-14 15:01:04,335] DEBUG
{org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
 Authorization cache miss for username : ROLDAP.com/testnew2 resource
/permission action : ui.execute
[2015-10-14 15:01:04,336] DEBUG
{org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
 Allowed roles for the ResourceID: /permission Action: ui.execute


Thanks & Kind regards,



On Wed, Oct 14, 2015 at 2:10 PM, Kavitha Subramaniyam <kavi...@wso2.com>
wrote:

> PFA for role list of user.
>
>
> Thanks,
> Kavitha.
>
> On Wed, Oct 14, 2015 at 1:50 PM, Darshana Gunawardana <darsh...@wso2.com>
> wrote:
>
>> User: userkavirw2 NOT in role: rolekavirw
>> [2015-10-14 13:25:46,039] DEBUG
>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
>> RWLDAP.COM/userkavirw2 <http://rwldap.com/userkavirw2> user is not in
>> role :  rwldap.com/rolekavirw
>>
>> So even you added userkavirw2 user to rolekavirw role, it's not picking
>> up in the runtime.
>>
>> Can you please check, role list of users in the mgt console and check
>> whether this particular role is listed to the user.
>>
>> Thanks,
>>
>> On Wednesday, 14 October 2015, Kavitha Subramaniyam <kavi...@wso2.com>
>> wrote:
>>
>>> Hi Darshana,
>>>
>>> please find the log for login with RW domain.
>>>
>>> [2015-10-14 13:25:46,003] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -
>>>  Authenticating user userkavirw2
>>> [2015-10-14 13:25:46,004] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Cache hit.
>>> Using DN uid=userkavirw2,ou=People,ou=WSO2,o=Opensource,dc=ITIndustry,dc=sl
>>> [2015-10-14 13:25:46,009] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  User:
>>> uid=userkavirw2,ou=People,ou=WSO2,o=Opensource,dc=ITIndustry,dc=sl is
>>> authnticated: true
>>> [2015-10-14 13:25:46,009] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
>>>  Authorization cache miss for username : rwldap.com/userkavirw2
>>> resource /permission/admin/login action : ui.execute
>>> [2015-10-14 13:25:46,009] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
>>>  Allowed roles for the ResourceID: /permission/admin/login Action:
>>> ui.execute
>>> [2015-10-14 13:25:46,009] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  role:
>>> apach.com/role_kavi
>>> [2015-10-14 13:25:46,010] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  role:
>>> admin
>>> [2015-10-14 13:25:46,010] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  role:
>>> rw2/rolekavirw3
>>> [2015-10-14 13:25:46,010] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  role:
>>> rwldap.com/chalitharole
>>> [2015-10-14 13:25:46,010] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  role:
>>> rwldap.com/rolekavirw
>>> [2015-10-14 13:25:46,010] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  role:
>>> secondrole1
>>> [2015-10-14 13:25:46,010] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  Roles
>>> which have permission for resource : /permission/admin/login action :
>>> ui.execute
>>> [2015-10-14 13:25:46,010] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  Role
>>> :  apach.com/role_kavi
>>> [2015-10-14 13:25:46,010] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  Role
>>> :  admin
>>> [2015-10-14 13:25:46,010] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  Role
>>> :  rw2/rolekavirw3
>>> [2015-10-14 13:25:46,010] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  Role
>>> :  rwldap.com/chalitharole
>>> [2015-10-14 13:25:46,010] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  Role
>>> :  rwldap.com/rolekavirw
>>> [2015-10-14 13:25:46,011] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -  Role
>>> :  secondrole1
>>> [2015-10-14 13:25:46,011] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
>>> RWLDAP.COM/userkavirw2 user is not in role :  apach.com/role_kavi
>>> [2015-10-14 13:25:46,011] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
>>> RWLDAP.COM/userkavirw2 user is not in role :  admin
>>> [2015-10-14 13:25:46,012] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
>>> RWLDAP.COM/userkavirw2 user is not in role :  rw2/rolekavirw3
>>> [2015-10-14 13:25:46,012] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  value
>>> after escaping special characters in userkavirw2 : userkavirw2
>>> [2015-10-14 13:25:46,012] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Escaped DN
>>> value for filter :
>>> [2015-10-14 13:25:46,012] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Do check
>>> whether the user : userkavirw2 is in role: chalitharole
>>> [2015-10-14 13:25:46,013] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Search
>>> filter : (&(objectClass=groupOfNames)(member=))
>>> [2015-10-14 13:25:46,013] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Requesting
>>> attribute: cn
>>> [2015-10-14 13:25:46,018] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Do check
>>> whether the user: userkavirw2 is in role: chalitharole
>>> [2015-10-14 13:25:46,018] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Search
>>> filter: (&(objectClass=groupOfNames)(member=))
>>> [2015-10-14 13:25:46,018] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Requesting
>>> attribute: cn
>>> [2015-10-14 13:25:46,024] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  User:
>>> userkavirw2 NOT in role: chalitharole
>>> [2015-10-14 13:25:46,024] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
>>> RWLDAP.COM/userkavirw2 user is not in role :  rwldap.com/chalitharole
>>> [2015-10-14 13:25:46,025] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  value
>>> after escaping special characters in userkavirw2 : userkavirw2
>>> [2015-10-14 13:25:46,025] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Escaped DN
>>> value for filter :
>>> [2015-10-14 13:25:46,025] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Do check
>>> whether the user : userkavirw2 is in role: rolekavirw
>>> [2015-10-14 13:25:46,026] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Search
>>> filter : (&(objectClass=groupOfNames)(member=))
>>> [2015-10-14 13:25:46,026] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Requesting
>>> attribute: cn
>>> [2015-10-14 13:25:46,034] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Do check
>>> whether the user: userkavirw2 is in role: rolekavirw
>>> [2015-10-14 13:25:46,035] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Search
>>> filter: (&(objectClass=groupOfNames)(member=))
>>> [2015-10-14 13:25:46,035] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Requesting
>>> attribute: cn
>>> [2015-10-14 13:25:46,039] DEBUG
>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  User:
>>> userkavirw2 NOT in role: rolekavirw
>>> [2015-10-14 13:25:46,039] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
>>> RWLDAP.COM/userkavirw2 user is not in role :  rwldap.com/rolekavirw
>>> [2015-10-14 13:25:46,040] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
>>> RWLDAP.COM/userkavirw2 user is not in role :  secondrole1
>>> [2015-10-14 13:25:46,040] DEBUG
>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
>>> rwldap.com/userkavirw2 user is not Authorized to perform ui.execute on
>>> /permission/admin/login
>>> [2015-10-14 13:25:46,040]  WARN
>>> {org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} -  Failed
>>> Administrator login attempt 'RWLDAP.COM/userkavirw2[-1234]
>>> <http://RWLDAP.COM/userkavirw2%5B-1234%5D>' at [2015-10-14
>>> 13:25:46,040+0530]
>>>
>>>
>>> Thanks & Kind regards,
>>>
>>> On Wed, Oct 14, 2015 at 1:03 PM, Darshana Gunawardana <darsh...@wso2.com
>>> > wrote:
>>>
>>>> And it seems you do not pr used the domain name when authenticating in
>>>> the last case. Can you login providing the domain of the RW userstore and
>>>> share the log.
>>>>
>>>>
>>>> On Wednesday, 14 October 2015, Darshana Gunawardana <darsh...@wso2.com>
>>>> wrote:
>>>>
>>>>> There seems to issue with domain handling as per following log,
>>>>>
>>>>> DEBUG
>>>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
>>>>> ROLDAP.COM/userkavirw2 <http://roldap.com/userkavirw2> user is not in
>>>>> role :  rwldap.com/rolekavirw
>>>>>
>>>>>
>>>>> Please raise a JIRA.
>>>>>
>>>>> Thanks,
>>>>> Darshana
>>>>>
>>>>> On Wednesday, 14 October 2015, Darshana Gunawardana <darsh...@wso2.com>
>>>>> wrote:
>>>>>
>>>>>>
>>>>>>
>>>>>> On Wednesday, 14 October 2015, Maduranga Siriwardena <
>>>>>> madura...@wso2.com> wrote:
>>>>>>
>>>>>>> Hi Kavitha,
>>>>>>>
>>>>>>> Have you assigned login permission to the user?
>>>>>>>
>>>>>>
>>>>>> As Maduranga mentioned, user "http://rwldap.com/userkavirw3"; doesn't
>>>>>> seems to have given login permission caused this behavior.
>>>>>>
>>>>>> Thanks,
>>>>>>
>>>>>>>
>>>>>>> Thanks,
>>>>>>> Maduranga.
>>>>>>>
>>>>>>> On Wed, Oct 14, 2015 at 10:09 AM, Kavitha Subramaniyam <
>>>>>>> kavi...@wso2.com> wrote:
>>>>>>>
>>>>>>>> Hi IS team,
>>>>>>>>
>>>>>>>> I have configured both R/W and Read only LDAP secondary user store
>>>>>>>> manager by using same ldap connection and I could not be able to login 
>>>>>>>> via
>>>>>>>> user created under RW ldap user store. But note that I could view the 
>>>>>>>> same
>>>>>>>> user under both secondary store's domain (Users & Roles -> List -> 
>>>>>>>> select
>>>>>>>> each domain and search).
>>>>>>>>
>>>>>>>> I want to check with you whether the above behavior is expected or
>>>>>>>> not, please clarify..
>>>>>>>>
>>>>>>>> Steps followed:
>>>>>>>> - Configure R/W secondary user store -
>>>>>>>> ReadWriteLDAPUserStoreManager - using open ldap connectoin 1
>>>>>>>> - Configure Read only secondary user store -
>>>>>>>> ReadOnlyLDAPUserStoreManager - using open ldap connectoin 1
>>>>>>>> - Create a user1 under R/W ldap domain
>>>>>>>> - Login by user1
>>>>>>>>
>>>>>>>> When try to login without domain, log shows as below:
>>>>>>>>
>>>>>>>> ----------------------------------------------------------------------------
>>>>>>>> [2015-10-13 16:32:55,232] DEBUG
>>>>>>>> {org.wso2.carbon.user.core.jdbc.JDBCUserStoreManager} -  SELECT * FROM
>>>>>>>> UM_USER WHERE UM_USER_NAME=? AND UM_TENANT_ID=?
>>>>>>>> [2015-10-13 16:32:55,241] DEBUG
>>>>>>>> {org.wso2.carbon.user.core.jdbc.JDBCUserStoreManager} -  User 
>>>>>>>> userkavirw3
>>>>>>>> login attempt. Login success :: false
>>>>>>>> [2015-10-13 16:32:55,241] DEBUG
>>>>>>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -
>>>>>>>>  Authenticating user userkavirw3
>>>>>>>> [2015-10-13 16:32:55,241] DEBUG
>>>>>>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Cache 
>>>>>>>> hit.
>>>>>>>> Using DN 
>>>>>>>> uid=userkavirw3,ou=People,ou=WSO2,o=Opensource,dc=ITIndustry,dc=sl
>>>>>>>> [2015-10-13 16:32:55,252] DEBUG
>>>>>>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  User:
>>>>>>>> uid=userkavirw3,ou=People,ou=WSO2,o=Opensource,dc=ITIndustry,dc=sl is
>>>>>>>> authnticated: true
>>>>>>>> [2015-10-13 16:32:55,253] DEBUG
>>>>>>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
>>>>>>>>  Authorization cache hit. roldap.com/userkavirw3 user is not
>>>>>>>> Authorized to perform ui.execute on /permission/admin/login
>>>>>>>> [2015-10-13 16:32:55,253]  WARN
>>>>>>>> {org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} -  Failed
>>>>>>>> Administrator login attempt 'ROLDAP.COM/userkavirw3[-1234]
>>>>>>>> <http://ROLDAP.COM/userkavirw3%5B-1234%5D>' at [2015-10-13
>>>>>>>> 16:32:55,253+0530]
>>>>>>>>
>>>>>>>>
>>>>>>>> When try to login with domain, log shows as below:
>>>>>>>>
>>>>>>>> ---------------------------------------------------------------------------
>>>>>>>> [2015-10-13 16:33:14,424] DEBUG
>>>>>>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -
>>>>>>>>  Authenticating user userkavirw3
>>>>>>>> [2015-10-13 16:33:14,425] DEBUG
>>>>>>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  Cache 
>>>>>>>> hit.
>>>>>>>> Using DN 
>>>>>>>> uid=userkavirw3,ou=People,ou=WSO2,o=Opensource,dc=ITIndustry,dc=sl
>>>>>>>> [2015-10-13 16:33:14,458] DEBUG
>>>>>>>> {org.wso2.carbon.user.core.ldap.ReadOnlyLDAPUserStoreManager} -  User:
>>>>>>>> uid=userkavirw3,ou=People,ou=WSO2,o=Opensource,dc=ITIndustry,dc=sl is
>>>>>>>> authnticated: true
>>>>>>>> [2015-10-13 16:33:14,463] DEBUG
>>>>>>>> {org.wso2.carbon.user.core.authorization.JDBCAuthorizationManager} -
>>>>>>>>  Authorization cache hit. rwldap.com/userkavirw3 user is not
>>>>>>>> Authorized to perform ui.execute on /permission/admin/login
>>>>>>>> [2015-10-13 16:33:14,463]  WARN
>>>>>>>> {org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} -  Failed
>>>>>>>> Administrator login attempt 'RWLDAP.COM/userkavirw3[-1234]
>>>>>>>> <http://RWLDAP.COM/userkavirw3%5B-1234%5D>' at [2015-10-13
>>>>>>>> 16:33:14,463+0530]
>>>>>>>>
>>>>>>>>
>>>>>>>> Thanks & Kind regards,
>>>>>>>> --
>>>>>>>> Kavitha.S
>>>>>>>> *Software Engineer -QA*
>>>>>>>> Mobile : +94 (0) 771538811 <%2B94%20%280%29%20773%20451194>
>>>>>>>> kavi...@wso2.com
>>>>>>>>
>>>>>>>> _______________________________________________
>>>>>>>> Dev mailing list
>>>>>>>> Dev@wso2.org
>>>>>>>> http://wso2.org/cgi-bin/mailman/listinfo/dev
>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> --
>>>>>>> Maduranga Siriwardena
>>>>>>> Software Engineer
>>>>>>> WSO2 Inc.
>>>>>>>
>>>>>>> email: madura...@wso2.com
>>>>>>> mobile: +94718990591
>>>>>>>
>>>>>>
>>>>>>
>>>>>> --
>>>>>> Regards,
>>>>>>
>>>>>>
>>>>>> *Darshana Gunawardana*Senior Software Engineer
>>>>>> WSO2 Inc.; http://wso2.com
>>>>>>
>>>>>> *E-mail: darsh...@wso2.com*
>>>>>> *Mobile: +94718566859 <%2B94718566859>*Lean . Enterprise . Middleware
>>>>>>
>>>>>>
>>>>>
>>>>> --
>>>>> Regards,
>>>>>
>>>>>
>>>>> *Darshana Gunawardana*Senior Software Engineer
>>>>> WSO2 Inc.; http://wso2.com
>>>>>
>>>>> *E-mail: darsh...@wso2.com*
>>>>> *Mobile: +94718566859 <%2B94718566859>*Lean . Enterprise . Middleware
>>>>>
>>>>>
>>>>
>>>> --
>>>> Regards,
>>>>
>>>>
>>>> *Darshana Gunawardana*Senior Software Engineer
>>>> WSO2 Inc.; http://wso2.com
>>>>
>>>> *E-mail: darsh...@wso2.com*
>>>> *Mobile: +94718566859 <%2B94718566859>*Lean . Enterprise . Middleware
>>>>
>>>>
>>>
>>>
>>> --
>>> Kavitha.S
>>> *Software Engineer -QA*
>>> Mobile : +94 (0) 771538811 <%2B94%20%280%29%20773%20451194>
>>> kavi...@wso2.com
>>>
>>
>>
>> --
>> Regards,
>>
>>
>> *Darshana Gunawardana*Senior Software Engineer
>> WSO2 Inc.; http://wso2.com
>>
>> *E-mail: darsh...@wso2.com <darsh...@wso2.com>*
>> *Mobile: +94718566859 <%2B94718566859>*Lean . Enterprise . Middleware
>>
>>
>
>
> --
> Kavitha.S
> *Software Engineer -QA*
> Mobile : +94 (0) 771538811 <%2B94%20%280%29%20773%20451194>
> kavi...@wso2.com <thili...@wso2.com>
>



-- 
Kavitha.S
*Software Engineer -QA*
Mobile : +94 (0) 771538811 <%2B94%20%280%29%20773%20451194>
kavi...@wso2.com <thili...@wso2.com>
_______________________________________________
Dev mailing list
Dev@wso2.org
http://wso2.org/cgi-bin/mailman/listinfo/dev

Reply via email to