WaveMaker Visual AJAX Studio 4.0 Training Role Based Access Control.

Slides:



Advertisements
Similar presentations
WaveMaker Visual AJAX Studio 4.0 Training
Advertisements

Forms Authentication, Users, Roles, Membership Ventsislav Popov Crossroad Ltd.
© 2008 RightNow Technologies, Inc. Title Best Practices for Maintaining Your RightNow Knowledge Base Penni Kolpin Knowledge Engineer.
Site Training Installation. Navigate to location of the install package Important – Launch the e-ISuite Installer using your agency’s install protocol.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Chapter 7 Managing Data Sources. ASP.NET 2.0, Third Edition2.
Database Updates Made Easy In WebFocus Using SQL And HTML Painter Sept 2011 Lender Processing Services 1.
Sql Server Advanced Features MIS 424 Professor Sandvig.
03/07/08 © 2008 DSR and LDAP Authentication Avocent Technical Support.
End User Administration (in context of Liferay CMS) Copyright © 2006 Liferay, LLC All Rights Reserved. No material may be reproduced electronically or.
8 Copyright © 2004, Oracle. All rights reserved. Creating LOVs and Editors.
WaveMaker Visual AJAX Studio 4.0 Training Studio Overview.
WaveMaker Visual AJAX Studio 4.0 Training Troubleshooting.
Forms Authentication, Users, Roles, Membership Svetlin Nakov Telerik Corporation
WaveMaker Visual AJAX Studio 4.0 Training Basics: LiveVariables.
Mindy Gigantelli Rebecca Zdon Gloria Queeno-Chamberlain.
Global Customer Partnership Council Forum | 2008 | November 18 1IBM - GCPC MeetingIBM - GCPC Meeting IBM Lotus® Sametime® Meeting Server Deployment and.
WaveMaker Visual AJAX Studio 4.0 Training Authentication.
Copyright 2000 eMation SECURITY - Controlling Data Access with
IS 221: DATABASE ADMINISTRATION Lecture 6:Create Users & Manage Users. Information Systems Department 1.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Sites Lists Advanced Site collection administration –Moving sites –Save site as template.
QAD.NET UI – Configured Screens Stacy Elwood Green, BravePoint MWUG September 2011.
Content Management System Overview. URL: Home Page.
10.1 Silberschatz, Galvin and Gagne ©2005 Operating System Principles 10.4 File System Mounting A file system must be mounted before it can be accessed.
CSCI 6962: Server-side Design and Programming Database Manipulation in ASP.
Damian Tamayo Tutorial DTM Data Generator Fall 2008 CIS 764.
WaveMaker Visual AJAX Studio 4.0 Training Basics: Building Your First Application Binding Basics.
WaveMaker Visual AJAX Studio 4.0 Training Basics: Building Your First Application Designer Basics.
What is Web Site Administration Tool ? WAT Allow you to Configure Web Site With Simple Interface –Manage Users –Manage Roles –Manage Access Rules.
Chapter 10: Rights, User, and Group Administration.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Profiles and Active Directory Overview User profiles –Import from Active Directory –Creating.
SharePoint Security Training Creating and Managing Users
2. SQL Security Objectives –Learn SQL Server 2000 components Contents –Understanding the Authentication Process –Understanding the Authorization Process.
3 Copyright © 2004, Oracle. All rights reserved. Working in the Forms Developer Environment.
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
Module 8 : Configuration II Jong S. Bok
CD Web XMS Training How to use the Xeno Media web site content management system.
WaveMaker Visual AJAX Studio 4.0 Training Pages, Layers and Navigation.
Combining ArcGIS for Server & ArcGIS Online Julia Guard and Matt Monson.
Information Management System “Institutions Module" Information Management System “Institutions Module" The System management module is an integrated part.
WaveMaker Visual AJAX Studio 4.0 Training Java Script Events.
…the basics…. Wildland Fire Information and Technology Server Requirements ● Windows 7 Professional or Windows 2003/2008 Server ● Windows 8/10 (discussion)
Intro To Oracle :part 1 1.Save your Memory Usage & Performance. 2.Oracle Login ways. 3.Adding Database to DB Trees. 4.How to Create your own user(schema).
WaveMaker Visual AJAX Studio 4.0 Training Custom Queries.
Working with ASP.NET Controls What is ASP.NET Using server controls in your pages Allowing users to create their own accounts Creating a login page Letting.
Developer Exam Preparation Thom Robbins Bryan Soltis
Introduction to SQL Server  Working with MS SQL Server and SQL Server Management Studio.
© 2014 IBM Corporation External Collaboration IBM Connections 5.0 Workshop IBM Ecosystem Development Duration: 30 minutes.
Access Lessons 1, 2 and 3 ©2009 M and K Solutions, LLC – All Rights Reserved.
WaveMaker Visual AJAX Studio 4.0 Training Styling your application.
Creel & Market Surveys Database Training Workshop - October/November 2014 Funded by European Union SciCOFish Scientific support for the management of Coastal.
WaveMaker Visual AJAX Studio 4.0 Training Basics: Templates.
SOP of Transferring PecStar Database October 2013.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Presented by [Harshit Agrawal] 04/03/2017
Table spaces.
iShop Training Module Access & Security
OpenGL project setup.
Data Virtualization Tutorial… LDAP Domains in CIS
Introduction to Web programming
Presented by [Harshit Agrawal] 03/02/2017
WAWF ECP 696 GAM Training for Activating Users v5.3
DB Implementation: MS Access Forms
Authentication and Authorization in ColdFusion
WAWF ECP 696 GAM Training for Activating Users v5.3
Combining ArcGIS for Server & ArcGIS Online
SOP of System Security Settings
PCW-09 Vision: Information Center Approval System
Query-by-Example Transparencies
Security - Forms Authentication
Presentation transcript:

WaveMaker Visual AJAX Studio 4.0 Training Role Based Access Control

2 What is Role Based Access Control ● Referred to as RBAC (R-BACK) ● Only available in the commercial addition of WM ● The ability to control application at run-time based on a users Role without writing and maintaining a bunch of “if…then” statements. ● Example: –Jill is a manager: He has the right to view Salary information –Joe is a employee: He can not view Salary information

3 What is Role Based Access Control ● RBAC allows you to –Allows you to control at the widget level the visibility of content on a page ● RBAC does not –Allow to control who can execute which services –Allow to control whether a piece of data is read-only or editable

4 Using Role Based Access Control ● Once security is enabled RBAC is available –Define Roles –Can be manually added or imported –Each widget now has a security property –Put a check next to each role which is allowed to view a widget –For container widgets which contain other widget’s –if the container is not visible then nor are any of it’s children –If a container is visible you can 0:M of it’s children can be hidden.

5 Defining Roles ● Roles are defined manually –Whether you are using Database authentication, LDAP or the Demo system –The roles to be used by the application must be manually entered under Role Configuration

6 Determining a User’s Role ● User roles are determine at Login –Database Roles –Can be stored in the same table as usernames/passwords –Can be fetched using a database query. This is useful if they are stored in separate table

7 Determining a User’s Role ● User roles are determine at Login –LDAP –Must define the LDAP groups to be searched –Work with your Directory Admin

8 Applying RBAC to widgets ● Select Widget on Canvas ● In the Properties Tree, click Security ● Select which users can view this Widget ● By default, Everyone has access ● It is that easy!!!

9 Questions?

10 Exercise 11 ● Enable security ● Add security to Widgets