This week's book giveaway is in the OO, Patterns, UML and Refactoring forum. We're giving away four copies of Refactoring for Software Design Smells: Managing Technical Debt and have Girish Suryanarayana, Ganesh Samarthyam & Tushar Sharma on-line! See this thread for details.
we are about to start a new project with S2 and been asked to see if acegi will be a good idea to integrate into our new application. In our past projects, we've wrote our own 'interceptors' for authorization/authentication issues (and we are very confident with that)
I searched about acegi and couldn't see the added-value to our new project. Can anyone come with an example of how acegi can easily solve a problem that interceptors will be very hard to implement?