Security Menu
The Ebase Xi system
includes a large number of security features including a built in system for
handling authentication and authorization.
Authentication is the process of user logon. This can include
manual logon by the user, or automated logon using single sign on systems or
user registries. Once a user has logged on, they are considered as
authenticated for the duration of their HTTP session. The logon process can be
configured so that it happens when a user first connects; alternatively the
logon process can occur on demand i.e. when a user first accesses a protected
resource.
Authorization is the process of checking whether a user has
access to a specific resource or function after they have been authenticated.
Runtime Security
Other Security Topics