Hi All,
I have been using A2 for a few years now, but I've not really needed to implement any deny/black-listing because I simply have no meaningful security/traffic constraints. In moving forward with development on top of A2 which does have security implications, I'm hoping it might be possible that folks might be willing to share how they store blocked remote addresses. For instance, are relational datastores and other such objects typically required at the enterprise level to store blocked addresses? Or is a plaintext file suitable from an efficiency standpoint?
Best,
Will F