"[EMAIL PROTECTED]" <[EMAIL PROTECTED]> writes:

> Personally, I would say this better be generalized to a user defined
> function as these authorization thing can easily get too complex. There
> you can implement using whatever thing that is appropriate(hook to
> LDAP, your own RDBMS tables etc.)

So if the return from this function was "True" you'd be granted access,
otherwise denied access?  It sounds OK to me -- for now. :-)

-- 
Jorge Godoy      <[EMAIL PROTECTED]>

Reply via email to