Security Menu

 

Documentation home

 

The Ebase Xi system includes a large number of security features including a built in system for handling authentication and authorization.

 

Authentication is the process of user logon. This can include manual logon by the user, or automated logon using single sign on systems or user registries. Once a user has logged on, they are considered as authenticated for the duration of their HTTP session. The logon process can be configured so that it happens when a user first connects; alternatively the logon process can occur on demand i.e. when a user first accesses a protected resource.

 

Authorization is the process of checking whether a user has access to a specific resource or function after they have been authenticated.

 

Runtime Security 

Runtime User Authentication

Runtime User Authorization

 

Other Security Topics

Ebase Secure Forms

Encryption of Form Parameters