For those interested, I believe I got this working, although I'm not yet
certain precisely what I did differently that made the difference. Details
of the custom security profiler are here
http://www.petrovic.org/content/SecMgrTutorial/sm.html .
On 11/5/06, Mark Petrovic <[EMAIL PROTECTED]> wr
In the course of teaching myself how to write a security manager that
reports to which resources an application wants runtime access, I have run
into something I do not understand. I struggled with whether to start here
or on a Sun security forum or on the Tomcat dev list. Given the problem may