/ by /   / 0 comments

User Authentication, Authorisation and Audit. Tell me more about how you handle this?

The system employs “Triple A” as expected from a system of this nature. Every request from the Baya Trove Hotel browser application is authenticated. Once a request has passed authentication a check is made to see if the user is authorised to perform the action requested. If the user is authorised then the request is actioned and the request details are logged for audit purposes. Using this method only authenticated and authorised requests are actioned and then the details of the request are logged.