Try OpenEdge Now
skip to main content
Identity Management
Configuring and Implementing Authorization in OpenEdge : User ID patterns as ACLs and ABL permissions checking : Data privacy
 

Data privacy

Data access restricted to named users while at rest or in transit. Combination of technologies:
*User authentication (for authorization)
*User authorization (data-access controls, including access control to the data's encryption key
*Encryption (of the data)