-
All levels of oxaion can be protected by firewalls. Communication can be encrypted using SSL.
-
oxaion supports the Kerberos login protocol for user authentication. The protocol provides additional protection for the system against attacks. This means that oxaion meets the highest security requirements and can be used via the Internet without any problems. Login is possible via single sign-on if desired and supports security systems such as smart cards or PKI.
-
Authorization management is particularly well developed in oxaion: beyond the standard functionality, authorizations can be created at the client, business area, and program levels. Different types of authorizations (viewing, editing) can be stored for individual data records and programs down to the record, field, and function levels.
