Demonstrate the system’s ability to apply access security based on the following:
• Define CRUD based on presentation forms
• Define CRUD based on database objects, i.e. tables, methods and services.
• Allocate above to role profiles.
• Linking roles to users
• Apply role based security according to set-up in run-time environment.
View details →