Databases Reference
In-Depth Information
There are three ways to create and implement an authorization scheme:
• In the shared components from the application:
1.
Create an authorization scheme from scratch.
2.
Copy an authorization scheme from an existing scheme.
• To create an access control administration page. This automates the step of
creating the authorization schemes:
1.
Create an access control page.
2.
Set the application mode.
3.
Add users to the access control list.
• Apply the authorization scheme to application components.
Creating an authentication schema from scratch
The following screenshot shows the shared components from the application—the
creation of an authorization schema:
The following screenshot shows the creation of the authorization schema
from scratch:
 
Search WWH ::




Custom Search