Implementing Security Overview For some users, the need to implement sign-on security in front of their applications is relatively low. However, at...
Row Level Security Row Level Security is a highly flexible technique for controlling which records are returned based on the current user. The...
Secure by User or Session ID After you have implemented Sign on Security (see here), you may want to control who can see which records. For...
Application Security – Locking Down your Applications Overview Many developers utilize m-Power’s built-in Dictionary Security, which requires end-users to sign on before running any applications in the...
Auditing m-Power Login Activity m-Power developers have the ability to log end-user activity for signon/signoff of generated applications. This functionality is quite useful for...
Automating m-Power Authentication Occasionally, developers need their users to authenticate to the m-Power server (For row level or menu security) but do not...
Securing Applications Against Multiple Validation Sources As you may know, m-Power applications can be configured to require Sign-on validation so that your user must first authenticate...
Modifying Default Tomcat User How can we change the default username/password Tomcat ships with? Various areas of Tomcat are secured to prevent unauthorized access,...
End-User Menuing Overview The menu system in m-Power offers a centralized location for end-users to access their applications (menu options). Using the...
Promote Menu Data Overview This document is applicable for m-Power clients who connect to different databases for their development and production applications. In...
Adding SSO (via OAuth2) to m-Power Applications This document will explain how to configure m-Power as well as a 3rd party tool (in our case, Microsoft’s Azure)...
Adding SSO (via SAML) to m-Power Applications This document will explain how to configure m-Power as well as a 3rd party tool (in our case, Microsoft’s Azure)...
Setting up Two-Factor Authentication (2FA) in m-Power Overview Two-factor authentication has become a popular method of providing an additional security layer in regards to user authentication. When...
Best Practices for Securing Public Facing Applications When deploying public facing applications, several steps can be taken to further protect your applications from nefarious activity. While m-Power...