Table of Contents |
---|
Listed below are some typical security implementations in Servoy applications.
...
In a fully custom security implementation, both authentication and authorization information is handled outside of Servoy built in security paradigm.
Steps
The developer writes code to assign form and table security to each part of the solution. This style of solution is normally managed by exclusion: instead of assigning permission to every part, just assign permissions to the part you want controlled. An example of this working can be found on the ServoyForge site in the Security framework.