Re: Tomcat access log question

2007-07-23 Thread Tim Funk
MAIL PROTECTED] > Subject: Re: Tomcat access log question > > I am actually not permitted to store any of these > confidential information any where including ( the > access logs ). Due to the rather specialized nature of your requirements, your best bet may well be to use your own

Re: Tomcat access log question

2007-07-22 Thread John Hui
gt; From: John Hui [mailto:[EMAIL PROTECTED] > Subject: Re: Tomcat access log question > > I am actually not permitted to store any of these > confidential information any where including ( the > access logs ). Due to the rather specialized nature of your requirements, your best be

RE: Tomcat access log question

2007-07-21 Thread Caldarale, Charles R
> From: John Hui [mailto:[EMAIL PROTECTED] > Subject: Re: Tomcat access log question > > I am actually not permitted to store any of these > confidential information any where including ( the > access logs ). Due to the rather specialized nature of your requirements, your be

Re: Tomcat access log question

2007-07-20 Thread John Hui
Thanks for the response Jacob. I think I should be more clear about my use case. I am actually not permitted to store any of these confidential information any where including ( the access logs ). That's why I want to encrypt these information. I can remove the entire query string from being l

Re: Tomcat access log question

2007-07-20 Thread Jacob Rhoden
John Hui wrote: I currently have Tomcat access log enable which will log all the query that hits my web server. Some of the information is "confidential". So is there a mechanism that I can use to add a interceptor or filter to "encrypt" those information before it gets log into the access l

Tomcat access log question

2007-07-20 Thread John Hui
I currently have Tomcat access log enable which will log all the query that hits my web server. Some of the information is "confidential". So is there a mechanism that I can use to add a interceptor or filter to "encrypt" those information before it gets log into the access log? Any suggestion