Configuring Runtime Security Using Access Control
In this section:
Overview
Login Authentication
Credentials Authentication
Roles
Impersonation
iWay Functional Language Functions
This section describes how to configure run-time security using access control.
iWay Software