The Texas Distrubted Business Environment

A True Security Model

Texas Business Software has been designed for multi-user distributed concurrent access and has been implemented with a true real world securlty model. The Texas Security Modle implements a hierarchical permission structure (as seen below) where users belonging to a permissions group above have the ability to control the users below.

A True Security Model

This hierarchical model gives system owners the ability to control the functionality of users by controlling which methods a user may access. For example the floor managerial staff may have permission to add, edit and delete system orders, while normal service staff would only have permission to add and edit system orders. This security model also prevents some users from accessing sensitive information - such as personal employee information like payroll or medical information.

Listen All
Comments (0)
Characters left: 2500
 

Contact Ekky

Thanks for your interest.

Ekky Software Customer Support Team.

Ekky Software Product Range
Ekky Software Homepage T-Accounts Online ObjectDatabase++ TScript Ekky Software Homepage T-Accounts Onlinee ObjectDatabase++ TScript