From 3a63dc4751de5be2c2193baccb427c81833fd80c Mon Sep 17 00:00:00 2001 From: Chris McDonough Date: Mon, 4 Jan 2010 15:01:34 +0000 Subject: --- docs/narr/security.rst | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/docs/narr/security.rst b/docs/narr/security.rst index 4c86c7f5e..f0f1ef531 100644 --- a/docs/narr/security.rst +++ b/docs/narr/security.rst @@ -12,6 +12,22 @@ appropriate level of access with respect to a specific Authorization is enabled by modifying your application to include a :term:`authentication policy` and :term:`authorization policy`. +.. warning:: + + Various systems exist for adding authentication and authorization + to arbitrary web frameworks. Two of these, :mod:`repoze.who` and + :mod:`repoze.what` are even written under the same Repoze "flag" as + :mod:`repoze.bfg`! However, neither :mod:`repoze.who` nor + :mod:`repoze.what` is required to add authorization or + authentication to a :mod:`repoze.bfg` application. In fact, unless + you have very specific requirements that include some sort of + "single sign on" or you need to integrate authorization across + multiple non-BFG Python applications, you can safely ignore the + existence of both :mod:`repoze.who` and :mod:`repoze.what`. These + packages exist mostly to make it possible to add authentication and + authorization to *other* web frameworks, such as Pylons; they are + not generally useful within :mod:`repoze.bfg` applications. + .. index:: pair: enabling; authorization policy -- cgit v1.2.3