The previous chapter dealt with using conditional display and authorization schemes to control which data users can access and modify. However, even when you use both of these methods, users may still be able to gain access to data that they should not be able to view, or even worse, be able to modify or delete that data.
KeywordsData Security Application Context Policy Function Page Request Security Logic
Unable to display preview. Download preview PDF.