22 Jun
2009
22 Jun
'09
3:16 p.m.
On Monday 22 June 2009, Jim Fulton wrote:
2 examples:
- Use a Python-based proxy that's good enough for supporting access control in trusted code. (It wouldn't protect against devious untrusted code, but most applications don't really need to run untrusted code.)
- Use a better system for managing checkers.
Probably the most important feature is disabling proxy-based protection for applications that don't need an access control model or that use a non-proxy-based approach.
Thanks, that helps me to put a context around the discussion. Regards, Stephan -- Entrepreneur and Software Geek Google me. "Zope Stephan Richter"