I'm confused:
Asim Riaz wrote:
my problem is the caller wasnt in the trusted table
... A?
he was able to bypass authentication as his ip was in
trusted table.
... B?
Propositions A and B seem to be at contradictory relation to each other.
--
Alex Balashov - Principal
Evariste Systems
Web :
http://www.evaristesys.com/
Tel : (+1) (678) 954-0670
Direct : (+1) (678) 954-0671
Mobile : (+1) (678) 237-1775