Allow the establishment of user identification policies, session duration, automatic control of log off, electronic signature, use of active directory (Windows), audit trail and a complete set user management features;
Provide flexibility to set privileges based on specific groups or users, including considering which permissions can be global or linked to a specific view, object or input action. And providing the possibility to generate commands with passwords to hinder actions by hackers;
Dynamically create users and store credentials in SQL or third-party system databases for integrated security or unified login.
Dynamically create users and store credentials in SQL or third-party system databases for integrated security or unified login.