"[EMAIL PROTECTED]" <[EMAIL PROTECTED]> writes: > Personally, I would say this better be generalized to a user defined > function as these authorization thing can easily get too complex. There > you can implement using whatever thing that is appropriate(hook to > LDAP, your own RDBMS tables etc.)
So if the return from this function was "True" you'd be granted access, otherwise denied access? It sounds OK to me -- for now. :-) -- Jorge Godoy <[EMAIL PROTECTED]>

