Hello, folks.
I apologize for intruding in something that is above my paygrade, but for whatever it's worth I will drop my .2c as a user just in case:
I spent the last weak extending the JDBC service to have an alternative that uses our own databases structure and pass encoding hash algorithms (btw, thanks for the guidance, it works like a dream! :) ) and the problems Christian described with the JDBC extension are, if not a complete deal breaker, frustrating to someone who is not aware of the inner workings of security subsystem. An average user would have a bad time if he screws up the configuration the first time.
Were not for the root password I would probably have flipped tables way more often than what I am known for and many times I had to manually edit the config.xml files because of some inconsistency or other odd things in the services I was creating.
Again: I dare not presume to pretend to have a say on anything, just sharing my experience. :)
Thanks!
--
Rodrigo Del C. Andrade
Analista de Sistemas
SIC - SSE - Soluções Segurança Pública
DÍGITRO TECNOLOGIA
E-mail: [email protected]
Fone: +55 48 3281-7000 Ramal: 7537
Fax: +55 48 3281-7299
Analista de Sistemas
SIC - SSE - Soluções Segurança Pública
DÍGITRO TECNOLOGIA
E-mail: [email protected]
Fone: +55 48 3281-7000 Ramal: 7537
Fax: +55 48 3281-7299
Esta mensagem, incluindo seus anexos, é reservada somente à Dígitro e ao destinatário da mensagem. Caso você tenha recebido esta mensagem por engano, Who is John Galt?
------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________ Geoserver-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/geoserver-devel
