On 03/03/2013 17:58, Alon Bar-Lev wrote:
Well, this is not entirely true.
Application need to gather user security profile which is the user and his roles.
Once the roles are in place, the privileges allocation can happen.
So application cannot really avoid searching the directory for groups.
to give a more specific example:
- permission was given to group C
- user has group A
- group A is contained in group B which is contained in group C