Viewing post 1 (of 1 total)
Good points by many - I agree with well0539 that authentication (connecting) and authorization (using) are two different issues, and protecting access to resources (authorization) is a matter of assigning...
June 24, 2002 at 8:42 am
#431458