-
-
-
- Introduction to security
- Secure development
- Security certification
- Field properties concerning security
- Developing user groups securely
- Security considerations for user interface
- Secure file organization
- Securely using the request
- Cross Site Scripting (XSS)
- Other options concerning secure development
- Security analysis
- Secure deployment
- Secure application management
- Scrambling of testdata
- Anonymization of personal data
- Using robots.txt
- Permission settings
- Security measures
- Data encryption
Security analysis
This page describes the different tools available to analyse the security of your application.
- Health check
On the application panel, errors and warnings of an application can be studied. Try to resolve these errors and warnings when possible. Less unnecessary errors and warnings means less distraction from important ones. It also means more attention can be paid to security analysis - Permission report
The Permission Matrices report can be used to studie permissions granted to all usergroups. - Security report
The Security report can be found on under theĀ Deployment menu in the backstage. It offers an oversight of (potential) risks in the application definition. - Notifications
The engine notifies application managers of important alerts. These alerts are known as AM-alerts and can be sent by mail, and studied in the application.