This week's book giveaway is in the Mac OS forum. We're giving away four copies of a choice of "Take Control of Upgrading to Yosemite" or "Take Control of Automating Your Mac" and have Joe Kissell on-line! See this thread for details.
Hi, I have a doubt regarding Deuling <auth-constraint> elements. How does the container resolve access if one security-constraint, has empty <auth-constraint/> tag and the other constraint has <auth-constraint> <role-name>*</role-name> </auth-constraint>
Which one does it consider? Allow access to everybody or allow access to nobody.