Tomcat doesn't do this, but on Windows it would certainly be possible to emulate the behavior that IIS provides in a Tomcat security filter. Upon return from doFilter it would RevertToSelf. I don't know what it means to do this on unix.
If you want to tell me more about your story/scenario and if it's worth it/interesting enough, I'd be glad to prototype something for Waffle (http://waffle.codeplex.com). cheers dB. dB. @ dblock.org Moscow|Geneva|Seattle|New York -----Original Message----- From: Timothy Taylor [mailto:[email protected]] Sent: Wednesday, May 26, 2010 7:06 PM To: [email protected] Subject: RE: TC security/impersonation question Hi, Just a dumb question from a newbe but if I implement any type of security with TC then under what identity will the invoked WS stack object execute the request? Specifically, if I enable Kerberos authentication between the requesting application and TC does this guarantee the WS stack executes the requestor's request under the identity of the actual originating requestor? Much appreciated, Tim. The New Busy think 9 to 5 is a cute idea. Combine multiple calendars with Hotmail. Get busy. _________________________________________________________________ Hotmail is redefining busy with tools for the New Busy. Get more from your inbox. http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_2 No virus found in this incoming message. Checked by AVG - www.avg.com Version: 9.0.819 / Virus Database: 271.1.1/2899 - Release Date: 05/27/10 02:25:00 --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
