Force-Field 4.1.0
The component enables you to manage access to objects of your application. It performs authentification and authorization of users: checks access permissions for every object and take a decision whether a user may or may not access this object.
Last update
1 Jan. 2007
Licence
Free to try |
$199.00
OS Support
Windows
Downloads
Total: 1,072 | Last week: 0
Ranking
#744 in
Components & Libraries
Publisher
Byte-force
Screenshots of Force-Field
Force-Field Publisher's Description
The component accomplishes main tasks in building a security scheme for your application. It performs authentification and authorization of users: controls access of certain users to some system objects.
The core advantages
� Reducing of development costs by using third-party software.
� The component can be integrated with an application on any phase of the project.
� Security scheme is easy to change; you don't have to modify the source code of your application. Just add new access rules using the component.
How does it work?
Users are organized into groups (roles). Access rules are defined not only for a certain user, but for all members of a group. All objects of an application are organized into a hierarchical structure. On the top level there is a root object. The list of user's roles is inherited when we move between different levels of structure. There is an access class associated with every object. An access class contains a number of rules. System receives a user request to perform a certain operation. It checks access class of this object by looking for a rule matching given situation. A rule can contain instruction to inherit the result of access control from the parent object. In this case system checks access permissions of the parent object. The result (admittance or prohibition) is used to answer to the request. If the rule isn't found, the operation is considered as forbidden. Access classes support inheritance. In that case a child class inherits all rules from the base class. If you need to set special access rules for a certain object, you could create an implicit class. It can be independent or based on an existent access class.
The component can be integrated with an application on any phase of the project.
The core advantages
� Reducing of development costs by using third-party software.
� The component can be integrated with an application on any phase of the project.
� Security scheme is easy to change; you don't have to modify the source code of your application. Just add new access rules using the component.
How does it work?
Users are organized into groups (roles). Access rules are defined not only for a certain user, but for all members of a group. All objects of an application are organized into a hierarchical structure. On the top level there is a root object. The list of user's roles is inherited when we move between different levels of structure. There is an access class associated with every object. An access class contains a number of rules. System receives a user request to perform a certain operation. It checks access class of this object by looking for a rule matching given situation. A rule can contain instruction to inherit the result of access control from the parent object. In this case system checks access permissions of the parent object. The result (admittance or prohibition) is used to answer to the request. If the rule isn't found, the operation is considered as forbidden. Access classes support inheritance. In that case a child class inherits all rules from the base class. If you need to set special access rules for a certain object, you could create an implicit class. It can be independent or based on an existent access class.
The component can be integrated with an application on any phase of the project.
Look for Similar Items by Category
Feedback
- If you need help or have a question, contact us
- Would you like to update this product info?
- Is there any feedback you would like to provide? Click here
Popular Downloads
- Kundli 4.5
- Macromedia Flash 8 8.0
- Cool Edit Pro 2.1.3097.0
- Hill Climb Racing 1.0
- Cheat Engine 6.8.1
- Grand Theft Auto: Vice City 1.0
- Grand Auto Adventure 1.0
- Tom VPN 2.2.8
- HTML To PHP Converter 6.0.1
- Zuma Deluxe 1.0
- Netcut 2.1.4
- Windows XP Service Pack 3 Build...
- Vector on PC 1.0
- Minecraft 1.10.2
- Ulead Video Studio Plus 11
- PhotoImpression 6.5
- Street Fighter 3 1.0
- Auto-Tune Evo VST 6.0.9.2
- Iggle Pop 1.0
- C-Free 5.0