?
Solved

application access control

Posted on 2013-12-02
2
Medium Priority
?
380 Views
Last Modified: 2013-12-03
For any in house built applications where their is an authentication process (i.e. username and password), and where access to the app should be tied down to only what the other needs to see, i.e. their account, team area of an application etc, where is access control typically designed. Lets for argument sake say its a text based records in the app, where do you develop your access logic in the app, is this at underlying database level, or within your code, or within both? how do you prevent them breaking out their area of the app, i.e. messing with object references to see if they can get to anothers area of the app/account

if for example you needed to demonstrate to an auditor that your app properly limits access to data based on "need to know" principles, how would you go about demonstrating this? where would you pluck the evidence from?

I appreciate this is very vague I was just intrigued where the access control is designed, and at what level of the apps stack
0
Comment
Question by:pma111
2 Comments
 
LVL 7

Accepted Solution

by:
dimmergeek earned 1000 total points
ID: 39691068
On our Intranet application we use Active Directory.  User puts his/her AD username and password in, and we create a list of groups that user is in.  We set access to pages and apps using AD groups.  If you're not a member of SG-IntraAPPS-SeeSalesDollars, then you cannot see the link that takes you to our sales dollars page.  Even if someone gave you the exact URL, we perform user authentication on over page (an include file that checks for a session variable)
0
 
LVL 34

Assisted Solution

by:Big Monty
Big Monty earned 1000 total points
ID: 39692732
there's multiple ways to setting up user security. AD is one way, and it is very secure. Other apps may control the access via the database, You  may have a users table, with encrypted passwords, and then you may have a permissions table, which stores the level of access they have with the userID. Going that route, you would then need to check the user access on each page.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, I’ll look at how you can use a backup to start a secondary instance for MongoDB.
Without even knowing it, most of us are using web applications on a daily basis.  In fact, Gmail and Yahoo email, Twitter, Facebook, and eBay are used by most of us daily—and they are web applications. We generally confuse these web applications to…
The viewer will get a basic understanding of what section 508 compliance can entail, learn about skip navigation links, alt text, transcripts, and font size controls.
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…
Suggested Courses

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question