Return-Path: Delivered-To: apmail-jakarta-avalon-phoenix-dev-archive@apache.org Received: (qmail 27226 invoked from network); 8 Sep 2002 13:49:06 -0000 Received: from unknown (HELO nagoya.betaversion.org) (192.18.49.131) by daedalus.apache.org with SMTP; 8 Sep 2002 13:49:06 -0000 Received: (qmail 13140 invoked by uid 97); 8 Sep 2002 13:49:40 -0000 Delivered-To: qmlist-jakarta-archive-avalon-phoenix-dev@jakarta.apache.org Received: (qmail 13123 invoked by uid 97); 8 Sep 2002 13:49:39 -0000 Mailing-List: contact avalon-phoenix-dev-help@jakarta.apache.org; run by ezmlm Precedence: bulk List-Unsubscribe: List-Subscribe: List-Help: List-Post: List-Id: "Avalon-Phoenix Developers List" Reply-To: "Avalon-Phoenix Developers List" Delivered-To: mailing list avalon-phoenix-dev@jakarta.apache.org Received: (qmail 13111 invoked by uid 98); 8 Sep 2002 13:49:39 -0000 X-Antivirus: nagoya (v4218 created Aug 14 2002) Message-ID: <3D7B553F.8000400@thinkdynamics.com> Date: Sun, 08 Sep 2002 09:48:47 -0400 X-Sybari-Trust: e80a147d 1892df56 e6981bed 0000093d From: Igor Fedorenko User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.0) Gecko/20020530 X-Accept-Language: en-us, en MIME-Version: 1.0 To: Avalon-Phoenix Developers List Subject: Re: Extending DefaultApplication References: <3D78DCA3.10106@thinkdynamics.com> <200209072153.11976.peter@apache.org> <3D79F887.7090602@thinkdynamics.com> <200209082234.09665.peter@apache.org> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit X-OriginalArrivalTime: 08 Sep 2002 13:48:56.0699 (UTC) FILETIME=[7A0BFCB0:01C2573E] X-Spam-Rating: daedalus.apache.org 1.6.2 0/1000/N X-Spam-Rating: daedalus.apache.org 1.6.2 0/1000/N public final class DefaultApplication => public class DefaultApplication class BlockEntry => public final class BlockEntry Plus a factory of Application instances. I will include these changes into security patch (or patches) I am going to submit week after next week. Peter Donald wrote: > On Sat, 7 Sep 2002 23:00, Igor Fedorenko wrote: > >>I need to set default security context for components (a.k.a. blocks) to >>be used when components are *not* working on behalf of a user/external >>system. For example I have Startable component that starts new threads >>to monitor some external devices. When new information becomes available >>this component calls other components and it has to provide security >>credentials to perform these calls. Important point here is that the >>calls are initiated from inside the system, so there is no user/external >>system to authenticate. > > > In that case we probably do need to extend application in some way. Can you > describe your minimum requirements for this? ie What is the minimum we can > get away with exposing? > -- Igor Fedorenko Think smart. Think automated. Think Dynamics. www.thinkdynamics.com -- To unsubscribe, e-mail: For additional commands, e-mail: