Tim,

It doesn’t look like your scheme gets access privileges from Windows Active 
Directory, instead you are getting them from your Users table. Is that correct? 
Do you also use 4D Users & Groups to define Groups to manage access to 
application features? So you don’t use the LDAP commands to get 4D Groups for 
the authenticated user?

The benefit of that is that the system administrators don’t need to know 
anything about how to edit 4D Users & Groups or update a custom User & Groups 
system (which appears your case).

Another question that comes to mind is why can't something similar to this work 
under MacOS? Isn’t there an LDAP equivalent for MacOS?

Tom Benedict

> On Jan 5, 2019, at 19:34, Tim Nevels via 4D_Tech <[email protected]> wrote:
> 
> 4D SSO implementation boils down to a single command “Current client 
> authentication”. Use that instead of “Current system user” command. This will 
> give you a guaranteed Windows login name that has been authenticated via 
> Windows Active Directory. This gives you reliable user identification. 
> 
> Once you have a user login name you can depend on — that’s what SSO and the 
> “Current client authentication” command does for you — you can then check if 
> that user login name is allowed into your database. In my case I just check 
> for a record in the [Users] table. 
> 

**********************************************************************
4D Internet Users Group (4D iNUG)
Archive:  http://lists.4d.com/archives.html
Options: https://lists.4d.com/mailman/options/4d_tech
Unsub:  mailto:[email protected]
**********************************************************************

Reply via email to