Thank you very much.
>Another approach I've seen is use AD to grant access to the application then have a user table in the app that determines which things the user can get to. Use their network user ID for this too.
>
>You could also have the user sign in with their AD account/pwd then authorize it against AD
>
>>Thank you very much. The more I learn about this process/approach the more I think it won't fly (in this particular organization). Back to the encryption or hash approach.
>>
"The creative process is nothing but a series of crises." Isaac Bashevis Singer
"My experience is that as soon as people are old enough to know better, they don't know anything at all." Oscar Wilde
"If a nation values anything more than freedom, it will lose its freedom; and the irony of it is that if it is comfort or money that it values more, it will lose that too." W.Somerset Maugham