Question:
How is remote security handled?
Answer:
There are a number of options. You can have programs require sign on using AS/400 profiles, or you can elect to run them in "anonymous" sessions where system sign on is not required. When signing in, normal OS/400 authorities are in play for the signed in user profile.
When running anonymous sessions, users come in under a generic OS/400 profile. This might be appropriate for "public" type applications that show information that anybody can view -- i.e. product listing on website, etc. Profound UI also supports basic authentication and single sign-on.
How is remote security handled?
-
- Site Admin
- Posts: 252
- Joined: Fri Dec 14, 2007 1:09 pm
- Contact:
Who is online
Users browsing this forum: No registered users and 1 guest