Child pages
  • Implementing Security

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents

Listed below are some typical security implementations in Servoy applications.

...

Fully Custom Security

In a fully custom security implementation, both authentication and authorization information is handled outside of Servoy built in security paradigm.

Steps

  • Create a custom authentication implementation as indicated above.
  • Create table(s) in the database to store information for permissions and restrictions in the application.
  • In the onOpen method of the solution, create code to read the metadata and apply permissions/restrictions for the current user.

The developer writes code to assign form and table security to each part of the solution.  This style of solution is normally managed by exclusion: instead of assigning permission to every part, just assign permissions to the part you want controlled.  An example of this working can be found on the ServoyForge site in the Security framework.