Composite Security Provider

The recommended approach for implementing custom security is to use the composite security provider. The composite security provider modularizes security into authentication and authorization functions. Authentication deals with retrieving user/role/group information and validating login requests. Authorization deals with assigning report- and portal-related permissions.

<< 6.1.4 Custom Security Integration © 1996-2013 InetSoft Technology Corporation (v11.4) Required Settings for Composite Security >>