About Security
IFS Applications security has been designed with modularity and flexibility
in mind. This allows enterprises to select the level of security that is right
for them, balancing threat prevention with simplicity and ease of use.
- The IFS Applications architecture enforces a uniform role-based
security model across the entire application. The role-based authorization model of IFS Applications ensures that only
authorized employees have access. Authorization can be performed by function
(What can I do?) and data (What ranges of data may I see?).
- IFS Applications relies on standard network, operating system, and
database security, and does not add or require a proprietary layer. Only
established technologies with known security properties are used, including
Oracle Database, Java EE application servers, Apache and IIS web servers, Active
DirectoryŽ, LDAP, HTTP and SSL.
- Since IFS Applications is based on standard technology it can be used
with network-level security solutions such as firewalls, proxies, SSL
encryption, VPN-networks. Demilitarized zone (DMZ), hardened perimeter defense, and other firewall
strategies can all be used with IFS Applications.
- IFS Applications has a built-in log function that tracks all modifications
to data, including details of what was modified by whom and what the previous
values were. This creates a clear audit trail of all changes or removals of
data.
All Security References
Contents