Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 
        
Home       Members    Calendar    Who's On


Add to briefcase

Secure Login Expand / Collapse
Author
Message
Posted Saturday, September 25, 2010 10:03 AM
Grasshopper

GrasshopperGrasshopperGrasshopperGrasshopperGrasshopperGrasshopperGrasshopperGrasshopper

Group: General Forum Members
Last Login: Tuesday, November 12, 2013 2:32 PM
Points: 22, Visits: 91
We will be releasing a site for our client, one of the question I am trying to answer is "How do I know they are who they say they are?".

There are various ideas I have in mind in order to tackle question. At the same time, I do not want to put so much security constraint that it becomes cumbersome for clients to register and use the site for their benefit.

I am interested on hearing from anyone who has good suggestions or have implemented something of this sort.
Post #993271
Posted Monday, September 27, 2010 1:47 AM


SSCrazy

SSCrazySSCrazySSCrazySSCrazySSCrazySSCrazySSCrazySSCrazy

Group: General Forum Members
Last Login: Yesterday @ 6:52 AM
Points: 2,820, Visits: 3,917
JStevenson1 (9/25/2010)
one of the question I am trying to answer is "How do I know they are who they say they are?".
login/username are provided by the admin( who is handling the customer care dept).and he/she is the person who knows which and what privileges and restriction should be given to customers/clients, based on their requirements.


-------Bhuvnesh----------
I work only to learn Sql Server...though my company pays me for getting their stuff done
Post #993482
Posted Monday, September 27, 2010 1:53 AM


SSC Eights!

SSC Eights!SSC Eights!SSC Eights!SSC Eights!SSC Eights!SSC Eights!SSC Eights!SSC Eights!

Group: General Forum Members
Last Login: Yesterday @ 12:45 AM
Points: 876, Visits: 3,952
you can create various role in your application and then tag the users in those roles.
So for example you have one group as AppAdmin who have unrestricted access of application and can see all modules. This role you then configure in database and give appropriate permission. Once your role created successfully then add the user/s in this role but must consider the sensitivity of permission attached with role.

Similarly you can create role specific to a perticular functionality and keep filtering it further as much secure you want your application.


----------
Ashish
Post #993485
« Prev Topic | Next Topic »

Add to briefcase

Permissions Expand / Collapse