Previous Topic: Design Functional Security


Security Approach Selection

The security approaches described in this chapter will provide sufficient transaction and functional security for most application systems.

These approaches can be enhanced to meet additional security requirements such as data or sub-functional security. For these additional requirements, you will have to develop application logic that functions similarly to the functional security technique.

Using the approaches outlined above, security for client/server applications becomes a server function.

The following list explains advantages of locating security within the server:

By integrating the security approaches in this chapter with the capabilities of CA Gen, you can achieve effective transaction and functional security for an application. As a result, a client/server applications can be secured as effectively as any block mode application.

In addition, by integrating GUI design capabilities, you can significantly improve an application's usability.