How to use security in SD synchronization without GAM? I need to block unwanted connections. How can I validate the execution of Synchronization.Send () and Synchronization.Receive () I can not use GAM because I have to adapt my application to a pre existing security system.
How to use security in sync sd without gam?
97 Views Asked by Esteban At
1
There are 1 best solutions below
Related Questions in GENEXUS
- Create Arabic msi (or any other locale, that is not listed in visual studio) using visual studio
- Read Platform information from .msi
- Patch building with MsiMsp.exe -- can target MSI differ from original MSI?
- MSI creation: Terminate application before upgrading
- Setup project always clean installation
- Use Orca to remove assembly from installer
- MSI Installer: Adding a non default action to a file extension
- Migrating PowerBuilder Application Build Process to TeamCity
- Stop windows service before perform the uninstallation
- How to execute spesific method from MSI dialog
Related Questions in GENEXUS-SD
- Create Arabic msi (or any other locale, that is not listed in visual studio) using visual studio
- Read Platform information from .msi
- Patch building with MsiMsp.exe -- can target MSI differ from original MSI?
- MSI creation: Terminate application before upgrading
- Setup project always clean installation
- Use Orca to remove assembly from installer
- MSI Installer: Adding a non default action to a file extension
- Migrating PowerBuilder Application Build Process to TeamCity
- Stop windows service before perform the uninstallation
- How to execute spesific method from MSI dialog
Related Questions in GENEXUS-GAM
- Create Arabic msi (or any other locale, that is not listed in visual studio) using visual studio
- Read Platform information from .msi
- Patch building with MsiMsp.exe -- can target MSI differ from original MSI?
- MSI creation: Terminate application before upgrading
- Setup project always clean installation
- Use Orca to remove assembly from installer
- MSI Installer: Adding a non default action to a file extension
- Migrating PowerBuilder Application Build Process to TeamCity
- Stop windows service before perform the uninstallation
- How to execute spesific method from MSI dialog
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular # Hahtags
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
There is currently no way for sending additional parameters or HTTP headers in the requests, so you'll need other means to identify your user.
One thing you could do, is call a procedure before synchronizing, passing the relevant information to identify the user (an authorization token or something like that). Then, you should validate that the next call is to the synchronization process, and check for instance that the IP address and the "device id" are the same.
Where would you validate the user's information, depends on which synchronization are we talking about.
For the Receive operation, you may perform your validations in the Offline Database object's
Start
event.For the Send operation, everything is saved to the database by using Business Components. So you may add your validations in all the BCs that are involved.
Note: having said all the above, it is highly recommended that you use GeneXus Access Manager (a.k.a. GAM), where all this is already solved.
Second note: you should use HTTPS in all your connections; otherwise, none of this will be secure.