Security

Authentication

Authentication is based on username/password.

Optionally 2-factor authentication can be set up using af mix of

Single sign on (optional)

Single sign on integration is included for

A group membership synchronization exists for

Anonymous users (optional)

External users can access data via the following methods

Authorization

User permissions are granted via inheritable group membership

Authorization schemes

Additionally special roles can be assigned

Encryption

Transport encryption is based on SSL via HTTPS policies

Storage encryption is best handled via operating system measures

Passwords are hashed using BCrypt algorithm.

Protection

Platform complies with all requirements in OWASP level 2


Revision #1
Created 7 April 2025 12:38:19 by Theis Villumsen
Updated 7 April 2025 12:38:53 by Theis Villumsen