In our model, the lazy approach wouldn't have bought us too much since we have
rich clients, meaning that all service invocations happen remotely. One of
our goals was to prevent sensitive information from even being transmitted to
the client. This means that we would have had to apply the laz
We utilized a Hibernate interceptor in our solution, though that is only a
part of the solution (the interceptor didn't give us everything we needed).
- Andy
On Wednesday 09 February 2005 09:40 pm, Ben Alex wrote:
> Gavin Terrill wrote:
> >We recently adopted Acegi Security for one of our ente
I am quite relieved to find that I'm not the only person facing this issue.
The discussion so far is quite invaluable and I hope we can continue this
thread. I have tried looking at Hibernate Interceptor, but I don't think it
is the ideal solution because not all of my objects are obtained by
Hi
Gavin Terrill wrote:
We recently adopted Acegi Security for one of our enterprise products
security requirement, and we will be facing the same issues, so this
thread is very useful and timely.
Thought out of the blue: instead of mutating the domain objects, would
it be possible to wrap them up in
er@lists.sourceforge.net
> Subject: Re: [Acegisecurity-developer] PostInvocation and
> Hibernate Sessions
>
>
> We developed our current ACL type system before Acegi had its
> ACL system, and
> planned for this behavior from the beginning (we work with
> Hibernate as
> well
9, 2005 3:55 PM
> To: acegisecurity-developer@lists.sourceforge.net
> Subject: Re: [Acegisecurity-developer] PostInvocation and Hibernate
> Sessions
>
> How would that solve this flow:
> 1. Get object from service call (the object has been modified by ACL
> security).
> 2. Change obje
acegisecurity-developer@lists.sourceforge.net
> > Subject: Re: [Acegisecurity-developer] PostInvocation and Hibernate
> > Sessions
> >
> > We developed our current ACL type system before Acegi had its ACL
>
> system,
>
> > and
> > planned for this behavior from
ary 09, 2005 3:23 PM
> To: acegisecurity-developer@lists.sourceforge.net
> Subject: Re: [Acegisecurity-developer] PostInvocation and Hibernate
> Sessions
>
> We developed our current ACL type system before Acegi had its ACL
system,
> and
> planned for this behavior from the be
We developed our current ACL type system before Acegi had its ACL system, and
planned for this behavior from the beginning (we work with Hibernate as
well). Our system has these abilities:
1. Property level ACLs. If the user does not have read access for a property,
then somehow blank it out s
Hi everyone,
I’ve started work on implementing acegi’s
post-invocation security w/ ACLs. I am also using Spring/Hibernate to
handle the data, and tx layer.
What I am attempting to do is have the post-invocation “scrub”
an domain object (which will have nested domain objects that
10 matches
Mail list logo