RE: TC security/impersonation question

2010-05-27 Thread dB .
sday, May 26, 2010 7:06 PM To: users@tomcat.apache.org Subject: RE: TC security/impersonation question Hi, Just a dumb question from a newbe but if I implement any type of security with TC then under what identity will the invoked WS stack object execute the request? Specifically,

Re: TC security/impersonation question

2010-05-27 Thread Pid *
On 27 May 2010, at 00:06, Timothy Taylor wrote: > Hi, > Just a dumb question from a newbe but if I implement any type of > security with TC then under what identity will the invoked WS stack > object execute the request? Specifically, if I enable Kerberos > authentication between the requesting a

RE: TC security/impersonation question

2010-05-26 Thread Timothy Taylor
Hi, Just a dumb question from a newbe but if I implement any type of security with TC then under what identity will the invoked WS stack object execute the request? Specifically, if I enable Kerberos authentication between the requesting application and TC does this guarantee the WS stack

tc security

2007-10-11 Thread Chris Pat
Hello I have 5.028 running in development production with a simple tomcat-users.xml, it works. When I run it in my ide, jb05, with the same tomcat-users.xml in the same config folder as server.xml, that it uses to run, it fails the security. The only possible reason I can assume is it is runni