Solved

application access control

Posted on 2013-12-02
2
346 Views
Last Modified: 2013-12-03
For any in house built applications where their is an authentication process (i.e. username and password), and where access to the app should be tied down to only what the other needs to see, i.e. their account, team area of an application etc, where is access control typically designed. Lets for argument sake say its a text based records in the app, where do you develop your access logic in the app, is this at underlying database level, or within your code, or within both? how do you prevent them breaking out their area of the app, i.e. messing with object references to see if they can get to anothers area of the app/account

if for example you needed to demonstrate to an auditor that your app properly limits access to data based on "need to know" principles, how would you go about demonstrating this? where would you pluck the evidence from?

I appreciate this is very vague I was just intrigued where the access control is designed, and at what level of the apps stack
0
Comment
Question by:pma111
2 Comments
 
LVL 7

Accepted Solution

by:
dimmergeek earned 250 total points
ID: 39691068
On our Intranet application we use Active Directory.  User puts his/her AD username and password in, and we create a list of groups that user is in.  We set access to pages and apps using AD groups.  If you're not a member of SG-IntraAPPS-SeeSalesDollars, then you cannot see the link that takes you to our sales dollars page.  Even if someone gave you the exact URL, we perform user authentication on over page (an include file that checks for a session variable)
0
 
LVL 33

Assisted Solution

by:Big Monty
Big Monty earned 250 total points
ID: 39692732
there's multiple ways to setting up user security. AD is one way, and it is very secure. Other apps may control the access via the database, You  may have a users table, with encrypted passwords, and then you may have a permissions table, which stores the level of access they have with the userID. Going that route, you would then need to check the user access on each page.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Learn by example how to specify CSS selectors for Selenium WebDriver test automation software.
Does your audience prefer people in photos or no people? How can you best highlight what you’re selling? What are your competitors doing, and what can you do that is different and unique from them?  Continue reading to learn how to make your images …
The purpose of this video is to demonstrate how to integrate Mailchimp with WordPress, by placing a Mailchimp signup form on a WordPress Page or Post. This will be demonstrated using a Windows 8 PC. Mailchimp will be used. Log into your Mailchi…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question