General Overview
Making use of the security modules, you can implement a complete access rules for systems developed by ScriptCase. The process for the security module creation is quick and simple.
Security module per Application
It has a restriction of access to applications according to the user. In this type of security, the administrator must define which applications can be accessed by system users.
In this type of security, these tables are created:
sec_users
CREATE TABLE "sec_users" (
"login" TEXT NOT NULL,
"pswd" TEXT NOT NULL,
"name" TEXT,
"email" TEXT,
"active" TEXT,
"activation_code" TEXT,
"priv_admin" TEXT,
"mfa" TEXT,
"picture" BLOB,
PRIMARY KEY ("login")
);
sec_apps
CREATE TABLE "sec_apps" (
"app_name" TEXT NOT NULL,
"app_type" TEXT,
"description" TEXT,
PRIMARY KEY ("app_name")
)
sec_users_apps
CREATE TABLE "sec_users_apps" (
"login" TEXT NOT NULL,
"app_name" TEXT NOT NULL,
"priv_access" TEXT,
"priv_insert" TEXT,
"priv_delete" TEXT,
"priv_update" TEXT,
"priv_export" TEXT,
"priv_print" TEXT,
PRIMARY KEY ("login", "app_name")
)
sec_logged
CREATE TABLE "sec_logged" (
"login" TEXT NOT NULL,
"date_login" TEXT,
"sc_session" TEXT,
"ip" TEXT
);
The table Logged users will be created only if the option Protect Logged users is checked during the Security Module creation.
sec_users_social
CREATE TABLE "sec_users_social" (
"login" TEXT NOT NULL,
"resource" TEXT NOT NULL,
"resource_id" TEXT NOT NULL,
PRIMARY KEY ("login", "resource", "resource_id")
);
The table users_social will be created only if the option Use social networks is checked during the Security Module creation.
sec_settings
CREATE TABLE "sec_settings" (
set_name TEXT NOT NULL,
set_value TEXT,
PRIMARY KEY ("set_name")
)