Security
For some users, the need to implement Sign-on security is relatively low. However, at some point in time, you may need to activate the mrc Built in Security.
Popular Security Documents
Activating built in security allows you to:
- Validate a User Against their System User Profile or a Database Table
- Implement a menuing System that shows users only applications they have access to
- Row Level Security (Limiting which rows of data a user can see at runtime)
- Capture the username for auditing purposes
- Create a fully customizable Sign on page
- Each time an application is run, it will check to see if security exists. If it does, the user will be brought to a sign-on page. If no security exists, it will take the user directly to their application