Tags » Access-Control

Jetico Personal Firewall

Jetico Personal Firewall

New Download : Jetico Personal Firewall

Jetico Personal Firewall

Jetico Personal Firewall software protects computers against hackers and malicious software when networked or connected to the Internet. 41 more words

OBIEE 10g and 11g: Comparing Repository And Catalog Security Models And Changes With Upgrade

How are security settings enabled / controlled in OBIEE 10g and 11g?

In OBIEE 10g, security is controlled at the following points: permissions on the OBIEE Presentation catalog, via the repository (users and passwords) and optionally via an external LDAP, or external tables. 499 more words


Web Application Security Basics – Safe file upload and File I/O

File upload and file i/o is a common feature which most of the web applications allow. It’s a critical part of any web application which should be carefully crafted and implemented since a single mistake could cause lot of trouble to an application. 1,669 more words

Web Security

Role based API Throttling through WSO2 API Manager

If you are already familiar with the WSO2 API Manager you would know that the API Manager provides the capability to apply throttling tiers to an exposed API. 348 more words

API Management

Web Application Security Basics – Access control

Identity and Access Control

Before paying attention about Access Control it is important to look at two keywords ; Authentication and Authorization.

Authentication : The process of verifying a user’s identity. 1,321 more words

Web Security

Modernizing the GRC Environment

by Bruce McCuaig

In the modern business environment, companies are often required to do more with less, while also navigating constantly shifting regulatory and technology frameworks. 416 more words

Enterprise Performance Management

XACML Reference Architecture based on WSO2 Identity Server

XACML is a powerful access control policy language implemented in XML that can provide a standardized way of validating authorization requests. XACML is the de-facto standard for authorization and provides the ability for a 3rd party application/component to enforce attribute based access control. 269 more words

API Security