Level Extreme platform
Subscription
Corporate profile
Products & Services
Support
Legal
Français
Active Directory
Message
 
 
To
12/05/2016 12:11:25
General information
Forum:
Visual FoxPro
Category:
Other
Miscellaneous
Thread ID:
01636224
Message ID:
01636237
Views:
54
Thank you very much.

>Another approach I've seen is use AD to grant access to the application then have a user table in the app that determines which things the user can get to. Use their network user ID for this too.
>
>You could also have the user sign in with their AD account/pwd then authorize it against AD
>
>>Thank you very much. The more I learn about this process/approach the more I think it won't fly (in this particular organization). Back to the encryption or hash approach.
>>
"The creative process is nothing but a series of crises." Isaac Bashevis Singer
"My experience is that as soon as people are old enough to know better, they don't know anything at all." Oscar Wilde
"If a nation values anything more than freedom, it will lose its freedom; and the irony of it is that if it is comfort or money that it values more, it will lose that too." W.Somerset Maugham
Previous
Reply
Map
View

Click here to load this message in the networking platform