m-Power Logo

m-Power Documentation

Security Documentation

Security

For some users, the need to implement Sign-on security is relatively low. However, at some point in time, you may need to activate the mrc Built in Security.

Popular Security Documents
 

Implementing

Locking Apps

Menuing

Best Practices

Activating built in security allows you to:

  • Validate a User Against their System User Profile or a Database Table
  • Implement a menuing System that shows users only applications they have access to
  • Row Level Security (Limiting which rows of data a user can see at runtime)
  • Capture the username for auditing purposes
  • Create a fully customizable Sign on page
  • Each time an application is run, it will check to see if security exists. If it does, the user will be brought to a sign-on page. If no security exists, it will take the user directly to their application

Search m-Power's Documentation

Additional Documentation

Documentation Videos

Row Level Security
Masking/Scrambling Data