Custom Security

Normally, security is handled according to the users roles, however sometimes it is important to control access by the location of the Client computer. For example, Clients with certain IP addresses can have a certain level of access, but Clients from computers with different IP addresses can have limited access. Likewise, the computer's host name is also a option.

This practice makes use of the system tags located in these location:

[System]Client/Network/Hostname
[System]Client/Network/IPAddress

Each Client will have access to distinct hostname and IP addresses. These can be used in Client startup scripts that evaluate the Client's information and compares it to a list of acceptable host names or IP addresses. This information can come from a database or a set of tags.

A Client startup script can make the comparison and make the appropriate decision. For example, it can set the connection state to read-only with the following function:

system.util.setConnectionState(2)

Or it can prevent a Client from logging in with the following script:

system.security.logout()

Next...