Try OpenEdge Now
Identity Management
Configuring and Implementing Authorization in OpenEdge
:
User ID patterns as ACLs and ABL permissions checking
:
Data privacy
Data privacy
Data access restricted to named users while at rest or in transit. Combination of technologies:
User authentication
(for
authorization
)
User authorization
(data-
access controls
, including
access control
to the data's
encryption key
Encryption
(of the data)