This week's book giveaway is in the Agile and Other Processes forum.
We're giving away four copies of The Little Book of Impediments (e-book only) and have Tom Perry on-line!
See this thread for details.
Win a copy of The Little Book of Impediments (e-book only) this week in the Agile and Other Processes forum!
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic

Doubt on auth-constraint

 
Sureshkumar Chinnappan
Greenhorn
Posts: 27
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Dear Ranchers,

In HFSJ page No 639 says, when interpreting two separate security-constraint the auth-constraint will work like,

2) Role name of "*" combines with anything else to allow access to everybody.
3) An empty <auth-constraint> tag combines with anything else to allow acces to noboddy! In other words, an empty <auth-constraint> is always the final word!.

In this what happen if the <auth-constraint> is like,
A) <auth-constraint> * </auth-constraint>
b) <auth-constraint/>
 
Gowher Naik
Ranch Hand
Posts: 643
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
write code yourself and see the result then we will discuss here.
 
Sureshkumar Chinnappan
Greenhorn
Posts: 27
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Sorry gowher,
I dont have the environment to do the same. Thats y I raised a query.
 
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic