Secondary authentication and authorization

Secondary authentication is the process of double-checking the identity of each user who attempts to view, run, schedule, or otherwise act upon an object that is managed by Crystal Enterprise. Authorization is the process of verifying that the user has been granted sufficient rights to perform the requested action upon the specified object.

When a user attempts to access an object on the system, the web browser sends the request by HTTP to the WCS. Before fulfilling the user's request, the WCS performs a series of security-related steps.

First, the WCS ensures that the user has a valid logon token:

Second, the WCS checks internally for an active WCS session that matches the user's logon token:

Third, the WCS ensures that the appropriate server component actually processes the user's request:

This secondary authentication and authorization process begins similarly to initial identification; here, however, the authentication algorithm followed by the WCS maintains system security in the fewest number of steps, thereby providing the most efficient response to the user's initial request.

Note:    If the user does not have the right to perform the requested action, the WCS displays an appropriate message. For details about setting object rights, see Controlling Users' Access to Objects.



Crystal Decisions, Inc.
http://www.crystaldecisions.com
Support services:
http://support.crystaldecisions.com