Presentation is loading. Please wait.

Presentation is loading. Please wait.

How does it work? Username Password Application Database Security Database Visual Guard User permissions PB Application PB objects modified dynamically.

Similar presentations


Presentation on theme: "How does it work? Username Password Application Database Security Database Visual Guard User permissions PB Application PB objects modified dynamically."— Presentation transcript:

1 How does it work? Username Password Application Database Security Database Visual Guard User permissions PB Application PB objects modified dynamically

2 Security Database Who will define the security information? Step 1 : the development team lists all possible permissions. (What can be authorized or not in each window of the application?) Step 2 : an administrator (end-user) lists all users of the application and grant them with permissions. DEVELOPERADMINISTRATOR Important : This does not require any technical skill. It can be done at any time after deployment.

3 Security Management DEVELOPER Application ADMINISTRATOR Application Used by developers before application deployment End-user application (no technical skill) Used after application deployment Profiles Customer managment, Product Management,… Ex : Customer Relationship Application Right to edit customers Right to view all orders,… Hide fields, disable menus, filter DW,… Sales Manager profile Secretary profile, etc… Mr Smith, Mrs Wesson, etc… Accounting department, Sales people, etc. Application Subdivision Permissions Technical Action User Groups Users Application


Download ppt "How does it work? Username Password Application Database Security Database Visual Guard User permissions PB Application PB objects modified dynamically."

Similar presentations


Ads by Google