Cool, I checked out the schema and tried some scenarios on my own. On Fri, 6 Aug 2004 07:10:40 +0000 (UTC), Henning P. Schmiedehausen <[EMAIL PROTECTED]> wrote: > > > Peng Tuck Kwok <[EMAIL PROTECTED]> writes: > > >Hi list. > > I'd just like to know if with turbine security whether it is > >possible to have sub-groups or whether anyone has done any extensions > >to it ? I'd appreciate the feedback thanks. > > Hi, > > can you explain what you mean with "sub-groups"? As our Security > System is role-based, you can assign a user multiple roles in > different groups and then check on the availability of a role. > > This should cover sub-groups as I understand them. > > Regards > Henning > > -- > Dipl.-Inf. (Univ.) Henning P. Schmiedehausen INTERMETA GmbH > [EMAIL PROTECTED] +49 9131 50 654 0 http://www.intermeta.de/ > > RedHat Certified Engineer -- Jakarta Turbine Development -- hero for hire > Linux, Java, perl, Solaris -- Consulting, Training, Development > > "Fighting for one's political stand is an honorable action, but re- > fusing to acknowledge that there might be weaknesses in one's > position - in order to identify them so that they can be remedied - > is a large enough problem with the Open Source movement that it > deserves to be on this list of the top five problems." > -- Michelle Levesque, "Fundamental Issues with > Open Source Software Development" > > --------------------------------------------------------------------- > To unsubscribe, e-mail: [EMAIL PROTECTED] > For additional commands, e-mail: [EMAIL PROTECTED] > >
--------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
