Administration Guide
Overview Guide
Installation Guide
Previous
Next
Contents
Implementing Role Authentication
Role security verifies access to an application based on the usage characteristic of the user. To implement role security, you must create the role or roles that users are mapped to by the application.
Role security is useful for applications with a large number of users and for applications that want to provide a more sophisticated level of user security. For more information about role security, see
"About Role Authentication."
The following procedures compose the implementation of role security:
Creating a Role
Modifying a Role
© Copyright 1998 Netscape Communications Corporation