Our solutions

How do we administer permissions in the application?

Dedicated application implementation based on the CloudTSL platform allows you to use ready-made, tested rights administration patterns that can be tailored exactly to your needs. As a result, our specialists create safe, proven and fully flexible solutions.

User rights administration is one of the fundamental elements of every application, the essence of this area is especially important in the case of dedicated applications, when we want to maintain flexibility and security.

A secure solution in a dedicated application must use mechanisms in all program elements - both the database, the server application and the client application. Only when these three elements are equipped with well-developed mechanisms, the security expected of ERP solutions is ensured. These are the solutions we create using our platform CloudTSL.

Zrzut ekanu - administracja uprawnieniami - wersja angielska
User edit panel (English version)

As part of a dedicated implementation, our specialists will help you create an authorization scheme on the basis of which employees will be assigned to appropriate authorization groups. Depending on the role in the organization, selected functionalities will be made available to them. Each user will have access only to the data necessary to perform his tasks. After starting the program, you can add new users to the created roles at any time or transfer them between existing groups.

Thanks to this approach, we are sure that the data in the company is well protected, it is impossible to obtain data by unauthorized persons. Logging into the system is possible with the login and password, or optionally also via Google. As a result, users do not have to remember their passwords. If they forget their password, they can retrieve it using their e-mail address. Importantly, passwords are not saved in the database - in accordance with global security standards.

Additionally, to ensure the highest level of security, we can implement more complex standards of 2-step verification by means of:

  • Phone - by sending SMS codes when logging in
  • Smartphone - entering keys from the Google Authenticator application
  • Physical security keys (U2F security key) - USB or NFC connection, e.g. Yubico Security Key.

It can also be used as a supplement to the above methods face recognition which is also implemented in our platform. We can use the image from the camera to take care of hiding particularly sensitive data when unauthorized people appear in the field of view. All these elements implemented by us mean that we provide our clients with solutions at the highest level of security and flexibility.

Share the post

Share on facebook
Share on linkedin
Share on twitter
Share on email

Do you want to know more? We are happy to talk!

This website uses cookies to provide you with a better user experience. By continuing to browse the site you accept ours privacy policy.