Browse Prior Art Database

Technique to extend application security

IP.com Disclosure Number: IPCOM000240556D
Publication Date: 2015-Feb-09
Document File: 4 page(s) / 82K

Publishing Venue

The IP.com Prior Art Database

Abstract

The advanced Web Application frameworks today have built-in strong security and application UI framework to control access and render data on the application page. The well designed application UI framework also has ability to secure data that is rendered on the screen. There are some UI components or tool designed which allow data to be downloaded or extracted into excel sheeet. While defining security profile for the users, one need to consider visibility and accessiblity of the data. No matter how restrictive access is defined the vulnerability of the UI components allow data access. This article describes a technique to extend the capablity of application security framework and enables granular access control.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 53% of the total text.

Page 01 of 4

Technique to extend application security

The solution was implemented for one of the prestigious customer which uses a software product to manage life cycle of their assets across the world. The customer had a critical requirement where it is required to provide restrictive access to certain group of users in terms of data visibility and accessibility. Essentially, the product's application framework should comply with Organization's separation of duties and provide granular access control. Any vulnerability of the application framework could compromise data security.

The most software product has built-in strong security and application UI framework to control access and render data on the application page. There are some UI components or tools designed which allow data to be downloaded or extracted into excel sheet. These UI components are generic in nature and tightly coupled with application framework. To accomplish the customer requirement, the application framework should be capable enough to control data visibility and accessibility. The application framework failed to comply with data accessibility and compromise data security. No matter how restrictive access is given to the user, allowed data access through UI component. The table UI component is one such component that allow data access. The table UI component displays data in tabular format and has a hyperlink attached to download data. As shown in figure 1, the 'Download' hyperlink is visible at the...