Hello, folks.

I apologize for intruding in something that is above my paygrade, but for whatever it's worth I will drop my .2c as a user just in case:

I spent the last weak extending the JDBC service to have an alternative that uses our own databases structure and pass encoding hash algorithms (btw, thanks for the guidance, it works like a dream! :) ) and the problems Christian described with the JDBC extension are, if not a complete deal breaker, frustrating to someone who is not aware of the inner workings of security subsystem. An average user would have a bad time if he screws up the configuration the first time.

Were not for the root password I would probably have flipped tables  way more often than what I am known for and many times I had to manually edit the config.xml files because of some inconsistency or other odd things in the services I was creating.

Again: I dare not presume to pretend to have a say on anything, just sharing my experience. :)

Thanks!

-- 
Rodrigo Del C. Andrade

Analista de Sistemas
SIC - SSE - Soluções Segurança Pública

DÍGITRO TECNOLOGIA
E-mail: [email protected]
Fone: +55 48 3281-7000 Ramal: 7537
Fax: +55 48 3281-7299

Esta mensagem, incluindo seus anexos, é reservada somente à Dígitro e ao destinatário da mensagem. Caso você tenha recebido esta mensagem por engano, Who is John Galt?

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Geoserver-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/geoserver-devel

Reply via email to