ORDA – Handle an event-driven logic during database operations
This feature keeps going on with a new paradigm: handle data in an event-driven way. The 4D 21 provides a complete series of events related to databas...
This feature keeps going on with a new paradigm: handle data in an event-driven way. The 4D 21 provides a complete series of events related to databas...
Discover here, how, in web processes, you can protect your resources (data + business logic) from malicious accesses and from unauthorized users ... i...
In recent releases, 4D’s security capabilities have been significantly expanded, particularly in the area of certificates. This includes auto-generate...
Some of you may need to manage the display of the connection interface during an OAuth 2.0 connection for design or technical reasons. From 4D 20 R6, ...
We recently provided a new way of controlling access to the REST API via the privileges and the ds.authentify function: Force Login. This feature offe...
Those of you who have started using Qodly Studio for 4D already know how powerful this new tool is for developing business web applications. If you h...
With 4D v19 R3, connecting your application to the Microsoft Graph API through OAuth 2.0 has become incredibly convenient using 4D NetKit. Now, with ...
Many companies are using Microsoft 365 (former Office 365). Besides providing access to Office applications, Microsoft provides an Azure-based Active ...
Projects introduced the new directory.json file containing users, groups and permissions. It allows authentication, restrictions, permissions on sever...
In the 4D v18 R6, 4D introduced OAuth 2.0 authentication to access emails through IMAP, SMTP, or POP3 transporters. Starting with 4D v19 R3, 4D contin...
Got a question, suggestion or just want to get in touch with the 4D bloggers? Drop us a line!
* Your privacy is very important to us. Please click here to view our Policy