The Experts below are selected from a list of 3 Experts worldwide ranked by ideXlab platform
Anna Duban - One of the best experts on this subject based on the ideXlab platform.
-
PROTECT OF K2 FIVE CORPORATE APPLICATION USING Authorization FRAMEWORK
Scientific Journal of Polonia University, 2018Co-Authors: Roman Duban, Sergei Neverov, Anna DubanAbstract:The article deals with the possibilities of protecting corporate applications that have been built on the K2 five platform. using new functions that provide an Authorization Package. Security settings are made with the new tools provided by the Authorization framework. The peculiarities of setting up and implementing the benefits of this type of protection are considered. The expediency of using built-in roles for organizing of access to system resources is substantiated. Described how to transfer settings between environments.
Roman Duban - One of the best experts on this subject based on the ideXlab platform.
-
PROTECT OF K2 FIVE CORPORATE APPLICATION USING Authorization FRAMEWORK
Scientific Journal of Polonia University, 2018Co-Authors: Roman Duban, Sergei Neverov, Anna DubanAbstract:The article deals with the possibilities of protecting corporate applications that have been built on the K2 five platform. using new functions that provide an Authorization Package. Security settings are made with the new tools provided by the Authorization framework. The peculiarities of setting up and implementing the benefits of this type of protection are considered. The expediency of using built-in roles for organizing of access to system resources is substantiated. Described how to transfer settings between environments.
Sergei Neverov - One of the best experts on this subject based on the ideXlab platform.
-
PROTECT OF K2 FIVE CORPORATE APPLICATION USING Authorization FRAMEWORK
Scientific Journal of Polonia University, 2018Co-Authors: Roman Duban, Sergei Neverov, Anna DubanAbstract:The article deals with the possibilities of protecting corporate applications that have been built on the K2 five platform. using new functions that provide an Authorization Package. Security settings are made with the new tools provided by the Authorization framework. The peculiarities of setting up and implementing the benefits of this type of protection are considered. The expediency of using built-in roles for organizing of access to system resources is substantiated. Described how to transfer settings between environments.