[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: auth-response comments
> First, please note my general aversion to unsolicited controls.
> IMO, controls should only be sent to clients which are known to
> be able to make use of the information.
>
I would concurr with this. In the general case, the client initiates a
request and might use a control. This then gives the server the
opportunity to put related controls in the response. If the client does
not use a control, the server should assume the client is uninformed
about them.
David
***************************************************
David Chadwick
IS Institute, University of Salford, Salford M5 4WT
Tel +44 161 295 5351 Fax +44 161 745 8169
Mobile +44 790 167 0359
Email D.W.Chadwick@salford.ac.uk
Home Page http://www.salford.ac.uk/its024/chadwick.htm
Understanding X.500 http://www.salford.ac.uk/its024/X500.htm
X.500/LDAP Seminars http://www.salford.ac.uk/its024/seminars.htm
Entrust key validation string MLJ9-DU5T-HV8J
***************************************************