Secondary authentication is the process of double
When a user attempts to access an object on the system, the web browser sends the request by HTTP to the WCS. Before fulfilling the user's request, the WCS performs a series of security
First, the WCS ensures that the user has a valid logon token:
For more information about logon tokens, see Logon tokens.
Second, the WCS checks internally for an active WCS session that matches the user's logon token:
Third, the WCS ensures that the appropriate server component actually processes the user's request:
For instance, if the user requests a list of reports in a specific folder, the WCS queries the APS database for a list of the reports that the user is authorized to see. The WCS then dynamically lists the reports in an HTML page, and sends the page to the user's browser.
For instance, if the user attempts to refresh a report's data, the WCS passes the request along to the Page Server. The Page Server passes the logon token to the APS to ensure that the user is authorized to refresh the report.
For details about how the APS calculates a user's effective rights to an object, see Calculating a user's effective rights.
This secondary authentication and authorization process begins similarly to initial identification; here, however, the authentication algorithm followed by the WCS maintains system security in the fewest number of steps, thereby providing the most efficient response to the user's initial request.
Note: If the user does not have the right to perform the requested action, the WCS displays an appropriate message. For details about setting object rights, see Controlling Users' Access to Objects.
Crystal Decisions, Inc. http://www.crystaldecisions.com Support services: http://support.crystaldecisions.com |