Re: [Acegisecurity-developer] PostInvocation and Hibernate Sessions

2005-02-10 Thread Andy Depue
In our model, the lazy approach wouldn't have bought us too much since we have rich clients, meaning that all service invocations happen remotely. One of our goals was to prevent sensitive information from even being transmitted to the client. This means that we would have had to apply the laz

Re: [Acegisecurity-developer] PostInvocation and Hibernate Sessions

2005-02-10 Thread Andy Depue
We utilized a Hibernate interceptor in our solution, though that is only a part of the solution (the interceptor didn't give us everything we needed). - Andy On Wednesday 09 February 2005 09:40 pm, Ben Alex wrote: > Gavin Terrill wrote: > >We recently adopted Acegi Security for one of our ente

RE: [Acegisecurity-developer] PostInvocation and Hibernate Sessions

2005-02-10 Thread Tim Kettering
I am quite relieved to find that I'm not the only person facing this issue. The discussion so far is quite invaluable and I hope we can continue this thread. I have tried looking at Hibernate Interceptor, but I don't think it is the ideal solution because not all of my objects are obtained by Hi

Re: [Acegisecurity-developer] PostInvocation and Hibernate Sessions

2005-02-09 Thread Ben Alex
Gavin Terrill wrote: We recently adopted Acegi Security for one of our enterprise products security requirement, and we will be facing the same issues, so this thread is very useful and timely. Thought out of the blue: instead of mutating the domain objects, would it be possible to wrap them up in

RE: [Acegisecurity-developer] PostInvocation and Hibernate Sessions

2005-02-09 Thread Gavin Terrill
er@lists.sourceforge.net > Subject: Re: [Acegisecurity-developer] PostInvocation and > Hibernate Sessions > > > We developed our current ACL type system before Acegi had its > ACL system, and > planned for this behavior from the beginning (we work with > Hibernate as > well

RE: [Acegisecurity-developer] PostInvocation and Hibernate Sessions

2005-02-09 Thread March, Andres
9, 2005 3:55 PM > To: acegisecurity-developer@lists.sourceforge.net > Subject: Re: [Acegisecurity-developer] PostInvocation and Hibernate > Sessions > > How would that solve this flow: > 1. Get object from service call (the object has been modified by ACL > security). > 2. Change obje

Re: [Acegisecurity-developer] PostInvocation and Hibernate Sessions

2005-02-09 Thread Andy Depue
acegisecurity-developer@lists.sourceforge.net > > Subject: Re: [Acegisecurity-developer] PostInvocation and Hibernate > > Sessions > > > > We developed our current ACL type system before Acegi had its ACL > > system, > > > and > > planned for this behavior from

RE: [Acegisecurity-developer] PostInvocation and Hibernate Sessions

2005-02-09 Thread March, Andres
ary 09, 2005 3:23 PM > To: acegisecurity-developer@lists.sourceforge.net > Subject: Re: [Acegisecurity-developer] PostInvocation and Hibernate > Sessions > > We developed our current ACL type system before Acegi had its ACL system, > and > planned for this behavior from the be

Re: [Acegisecurity-developer] PostInvocation and Hibernate Sessions

2005-02-09 Thread Andy Depue
We developed our current ACL type system before Acegi had its ACL system, and planned for this behavior from the beginning (we work with Hibernate as well). Our system has these abilities: 1. Property level ACLs. If the user does not have read access for a property, then somehow blank it out s

[Acegisecurity-developer] PostInvocation and Hibernate Sessions

2005-02-09 Thread Tim Kettering
  Hi everyone,   I’ve started work on implementing acegi’s post-invocation security w/ ACLs.  I am also using Spring/Hibernate to handle the data, and tx layer.   What I am attempting to do is have the post-invocation “scrub” an domain object (which will have nested domain objects that