Postby ConvertFromOldNGs » Fri Aug 07, 2009 12:02 pm
by Krull >> Tue, 24 Apr 2001 5:58:47 GMT
Hi Iain,
Do you have access to the JADE object manager guide, which is one of the standard hard-copy JADE manuals? The section on User-Validation support in the JADE Object Manager security section provides a bit of an overview on the purpose and the usage of these methods. The default implementations of these methods don't implement any security whatsoever, they are intended to provide 'security hooks'; you hook into the mechanism by reimplementing the methods in a user sub schema.
If you don't have access to that JOM manual, I can post a copy of the relevant section here.
The default getAndValidateUser method is defined and implemented in the RootSchemaGlobal global class of the Root Schema. On all supported O/Ss, the default implementation simply manufactures a usercode that consists of the login account name suffixed with the operating system process ID, and returns this "manufactured usercode", a null password, and a result of true. On NT it doesn't do any validation against a PDC or local security system.
The default implementation of isUserValid unconditionally returns true.