[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#123526: O: zope-loginmanager -- User Folder workalike and replacement for Zope



Package: wnpp
Severity: normal

The current maintainer of zope-loginmanager, Mike Goldman <whig@debian.org>,
is apparently not active anymore.  Therefore, I orphan this package
now.  If you want to be the new maintainer, please take it -- retitle
this bug from 'O:' to 'ITA:', fix the outstanding bugs and upload a
new version with your name in the Maintainer: field and a

   * New maintainer (Closes: #thisbug)

in the changelog so this bug is closed.

Some information about this package:

Package: zope-loginmanager
Priority: extra
Section: web
Installed-Size: 196
Maintainer: Mike Goldman <whig@debian.org>
Architecture: i386
Version: 0.8.8b1-1
Depends: zope
Filename: pool/main/z/zope-loginmanager/zope-loginmanager_0.8.8b1-1_i386.deb
Size: 25970
MD5sum: 78b005847aa38fd53f2e71f87424f6f1
Description: User Folder workalike and replacement for Zope
 LoginManager is a User Folder workalike and replacement which solves the
 "N * M" problem seen with previous User Folders.  Because of its
 PlugIn-based architecture, it will almost never need to be subclassed to
 implement custom functionality. (For more information on the PlugIn
 system, see the Products.ZPatterns.PlugIns module source.)
 .
 LoginManager uses two kinds of PlugIns, the "User Source" and the "Login
 Method". User Sources provide an interface to an arbitrary store of user
 records. A LoginManager may contain multiple User Sources, and will
 search them in user-defined order until one returns a valid user object.
 .
 Login Methods are responsible for examining a REQUEST for identification
 and credentials. They are also indirectly responsible for authenticating
 the user. In most cases, they simply call user.authenticate(), passing
 the credentials (typically a password) they extracted from the REQUEST.
 A single LoginManager may contain multiple Login Methods, which are
 tried in user-defined order, and the result of the last Login Method is
 used. (Most Login Methods simply return the result of the previous Login
 Method if it had already validated a user. But the sequence is chained
 to allow for voting, multi-credential requirements, etc.)



-- 
Martin Michlmayr
tbm@cyrius.com



Reply to: