You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@jena.apache.org by cl...@apache.org on 2016/11/07 23:02:43 UTC

svn commit: r1768606 - /jena/site/trunk/content/documentation/permissions/example.mdtext

Author: claude
Date: Mon Nov  7 23:02:43 2016
New Revision: 1768606

URL: http://svn.apache.org/viewvc?rev=1768606&view=rev
Log:
fixed link and add another reference.

Modified:
    jena/site/trunk/content/documentation/permissions/example.mdtext

Modified: jena/site/trunk/content/documentation/permissions/example.mdtext
URL: http://svn.apache.org/viewvc/jena/site/trunk/content/documentation/permissions/example.mdtext?rev=1768606&r1=1768605&r2=1768606&view=diff
==============================================================================
--- jena/site/trunk/content/documentation/permissions/example.mdtext (original)
+++ jena/site/trunk/content/documentation/permissions/example.mdtext Mon Nov  7 23:02:43 2016
@@ -179,4 +179,4 @@ This example allows any action on a grap
     }
 
 The other overridden methods are implemented using one of three (3) private methods that evaluate if the user should have access to the data based on our security design.
-To implement your security design you should understand what each of the methods checks.  See the [SecurityEvaluator](../../javadoc/permissions/org/apache/jena/permissions/SecurityEvaluator.html) javadocs.
+To implement your security design you should understand what each of the methods checks.  See the [SecurityEvaluator](../javadoc/permissions/org/apache/jena/permissions/SecurityEvaluator.html) javadocs and [SecurityEvaluator implementation](./evaluator.html) notes.