How is remote security handled?
Posted: Tue Aug 03, 2010 10:37 am
Question:
How is remote security handled?
Answer:
There are a number of options. You can have programs require sign on using AS/400 profiles, or you can elect to run them in "anonymous" sessions where system sign on is not required. When signing in, normal OS/400 authorities are in play for the signed in user profile.
When running anonymous sessions, users come in under a generic OS/400 profile. This might be appropriate for "public" type applications that show information that anybody can view -- i.e. product listing on website, etc. Profound UI also supports basic authentication and single sign-on.
How is remote security handled?
Answer:
There are a number of options. You can have programs require sign on using AS/400 profiles, or you can elect to run them in "anonymous" sessions where system sign on is not required. When signing in, normal OS/400 authorities are in play for the signed in user profile.
When running anonymous sessions, users come in under a generic OS/400 profile. This might be appropriate for "public" type applications that show information that anybody can view -- i.e. product listing on website, etc. Profound UI also supports basic authentication and single sign-on.