Authorization Package - Explore the Science & Experts | ideXlab

Scan Science and Technology

Contact Leading Edge Experts & Companies

Authorization Package

The Experts below are selected from a list of 3 Experts worldwide ranked by ideXlab platform

Anna Duban – One of the best experts on this subject based on the ideXlab platform.

  • PROTECT OF K2 FIVE CORPORATE APPLICATION USING Authorization FRAMEWORK
    Scientific Journal of Polonia University, 2018
    Co-Authors: Roman Duban, Sergei Neverov, Anna Duban

    Abstract:

     The article deals with the possibilities of protecting corporate applications that have been built on the K2 five platform. using new functions that provide an Authorization Package. Security settings are made with the new tools provided by the Authorization framework. The peculiarities of setting up and implementing the benefits of this type of protection are considered. The expediency of using built-in roles for organizing of access to system resources is substantiated. Described how to transfer settings between environments.

Roman Duban – One of the best experts on this subject based on the ideXlab platform.

  • PROTECT OF K2 FIVE CORPORATE APPLICATION USING Authorization FRAMEWORK
    Scientific Journal of Polonia University, 2018
    Co-Authors: Roman Duban, Sergei Neverov, Anna Duban

    Abstract:

     The article deals with the possibilities of protecting corporate applications that have been built on the K2 five platform. using new functions that provide an Authorization Package. Security settings are made with the new tools provided by the Authorization framework. The peculiarities of setting up and implementing the benefits of this type of protection are considered. The expediency of using built-in roles for organizing of access to system resources is substantiated. Described how to transfer settings between environments.

Sergei Neverov – One of the best experts on this subject based on the ideXlab platform.

  • PROTECT OF K2 FIVE CORPORATE APPLICATION USING Authorization FRAMEWORK
    Scientific Journal of Polonia University, 2018
    Co-Authors: Roman Duban, Sergei Neverov, Anna Duban

    Abstract:

     The article deals with the possibilities of protecting corporate applications that have been built on the K2 five platform. using new functions that provide an Authorization Package. Security settings are made with the new tools provided by the Authorization framework. The peculiarities of setting up and implementing the benefits of this type of protection are considered. The expediency of using built-in roles for organizing of access to system resources is substantiated. Described how to transfer settings between environments.