|
@@ -40,6 +40,9 @@
|
|
|
<li><b><a href="http://www.javalobby.org/articles/acegisecurity/part1.jsp">Securing Your Java Applications - Acegi Security Style</a></b>:
|
|
|
Matthew Porter wrote this good introductory article for Javalobby.<br><br>
|
|
|
</li>
|
|
|
+ <li><b><a href="http://jroller.com/page/paskos?entry=acegi_portable_independent_and_rich">Acegi: Portable, Independent and Rich Webapp Security</a></b>:
|
|
|
+ Pascal Gehl relates his experience in migrating from CMA to Acegi Security.<br><br>
|
|
|
+ </li>
|
|
|
<li><b><a href="http://raibledesigns.com/page/rd/20050617#presentations_acegi_security_and_spring">Acegi Security High-Level Overview Presentation</a></b>:
|
|
|
Matt Raible has provided a nice <a href="http://www2.java.no/web/files/moter/mai05/AcegiSecurity.pdf">PDF presentation</a> comparing Acegi Security and J2EE CMA.<br><br>
|
|
|
</li>
|