|
You can also customize security by creating sql roles and
assigning integrated accounts to those roles.
Jeff King, RN,
MCSE
Network Applications Analyst
JPS Health Network
817.920.6759
From: Micky Fokken [mailto:[EMAIL PROTECTED] Sent: Wednesday, March 10, 2004 2:30 PM To: [EMAIL PROTECTED] Subject: Controlling user security through table or SQL users Hi, Do you
usually control user security in your application with a user table or using
integrated SQL user accounts. I'm
assuming user tables so you can customize the security to not only table
read/write access, but specific application
features: Table 1
- user information, including username/password Table 2
- Security options - such as access to accounting admin tool, or ability to
add/delete users (features that are specific to the app I'm
creating) Table 3
- link users to security options Recommendations, or links to web resources are
welcome. Thanks, Micky |
