Child pages
  • Implementing Security
Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Listed below are some typical security implementations in Servoy applications.

Basic Servoy Security

Practical where the security will be managed by the developer of the application and does not require anyone else configuring users or permissions.

Steps

  • Using the User/Group editor, decide what authorization permission groups are required for the application.  Create these groups before development begins.
  • During development of tables and forms, use the settings on the security tab of each editor to configure what permissions each group has for the table/form.  Keep in mind during form development that elements must be named in order to assign permissions.
  • Set the mustAuthenticate flag to true (selected) for the solution.
  • Create users with either the User/Group editor or with the Users page in the application server administration utility.  Assign users to groups in either editor.
  • Deploy the application.  When launching the application, the default login window will appear to authenticate the user.

Custom Authentication

  • No labels