Customizing Authorization
Overview
Creating Authorization Data Mapping
Creating a New Security Role
Creating a New Security Group
Linking the Security Group to the Security Role
Creating the Security Identifier (SID)
Linking the Security Group to the SID
Linking the Security Role to the User
Loading Security Information onto the Database
Creating Function Identifiers (FIDs)
Switching Security off for a Process Method
Security Considerations During Development
Controlling the Logging of Authorization Failures for the Client
Authorizing New SID Types
Analyzing the AuthorisationLog Database Table
Parent topic:
Cúram Security Guide