Making use of the security modules, you can implement a complete access rules for systems developed by ScriptCase. The process for the security module creation is quick and simple.
Security module per User
In user security, all registered users have access to system applications, working only as user authentication.
For those who want to create the tables in advance, only the user table is mandatory. The logged and users_social tables are created only when activating the Protect Logged users and Use social networks options, respectively.
Below see all the tables created for this type of security.
CREATE TABLE "sec_users" ( "login" TEXT NOT NULL, "pswd" TEXT NOT NULL, "name" TEXT, "email" TEXT, "active" TEXT, "activation_code" TEXT, "priv_admin" TEXT, "mfa" TEXT, "picture" BLOB, PRIMARY KEY ("login") );
CREATE TABLE "sec_logged" ( "login" TEXT NOT NULL, "date_login" TEXT, "sc_session" TEXT, "ip" TEXT );
The table Logged users will be created only if the option Protect Logged users is checked during the Security Module creation.
CREATE TABLE "sec_users_social" ( "login" TEXT NOT NULL, "resource" TEXT NOT NULL, "resource_id" TEXT NOT NULL, PRIMARY KEY ("login", "resource", "resource_id") );
The table users_social will be created only if the option Use social networks is checked during the Security Module creation.
CREATE TABLE "sec_settings" ( set_name TEXT NOT NULL, set_value TEXT, PRIMARY KEY ("set_name") )