You can also customize security by creating sql roles and assigning integrated accounts to those roles.
 
Jeff King, RN, MCSE
Network Applications Analyst
JPS Health Network
817.920.6759
 


From: Micky Fokken [mailto:[EMAIL PROTECTED]
Sent: Wednesday, March 10, 2004 2:30 PM
To: [EMAIL PROTECTED]
Subject: Controlling user security through table or SQL users

Hi,

Do you usually control user security in your application with a user table or using integrated SQL user accounts.

 

I'm assuming user tables so you can customize the security to not only table read/write access, but specific application features:

 

Table 1 - user information, including username/password

Table 2 - Security options - such as access to accounting admin tool, or ability to add/delete users (features that are specific to the app I'm creating)

Table 3 - link users to security options

 

Recommendations, or links to web resources are welcome.

 

Thanks,

Micky

 

 

 

Reply via email to