Security Design Patterns
Hello, Does someone know of a good resource discussing the most common security design patterns (users, roles, proxy, local roles, etc.)? The Zope Book has a section on this topic, but it is quite basic. Thanks, Robert __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
Robert Jean wrote:
Hello,
Does someone know of a good resource discussing the most common security design patterns (users, roles, proxy, local roles, etc.)? The Zope Book has a section on this topic, but it is quite basic.
I hope you'll pardon my tooting my own horn here, but the Zope Bible [1] has a chapter on Zope Product Security (chapter 9) and another on User Management and Security (chapter 13). These chapters don't cover *everything*, but they should give you a good start. [1] http://www.amazon.com/exec/obidos/ASIN/0764548573/fiawol Cheers, - Michael Bernstein
participants (2)
-
Michael Bernstein -
Robert Jean