On 03/05/2010 11:09 AM, Marley wrote: > >> Application implementation features are so sufficiently disparate that >> they discourage specific toolkit implementations. > > So how does one implement Authentication/Authorization? Roll your > own? The short answer (besides Q.E.D.) is yes.
I don't remember your earlier posts. You might have mentioned that you've reviewed the "best practices" recommendations at the Google Groups home page. If you haven't, I'd start there. > what about things like Spring Security? No one should use that? I'm guessing that a search of the list archives will uncover some useful advice. -- You received this message because you are subscribed to the Google Groups "Google Web Toolkit" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/google-web-toolkit?hl=en.
