Jump to: navigation, search


2 bytes removed, 17:38, 2 February 2009
no edit summary
h1. =General rule: Abstract things out as much as makes sense=
h2. ==Specific rule: Abstract the living crap out of your authentication scheme.==
Look, pretty much everyone with anything worth protecting already has an auth/authZ infrastructure in place. Sometimes an extensive, perhaps multi-institutional infrastructure. One that isn’t going to be bypassed without, say, getting fired.

Navigation menu