Integrating User Authentication in Your Qodly Applications
In this week's blog, we will focus on the crucial topic of authentication. To illustrate our discussion, we will use the example of an application des...
In this week's blog, we will focus on the crucial topic of authentication. To illustrate our discussion, we will use the example of an application des...
In recent releases, 4D’s security capabilities have been significantly expanded, particularly in the area of certificates. This includes auto-generate...
Many companies are using Microsoft 365 (former Office 365). Besides providing access to Office applications, Microsoft provides an Azure-based Active ...
In the 4D v18 R6, 4D introduced OAuth 2.0 authentication to access emails through IMAP, SMTP, or POP3 transporters. Starting with 4D v19 R3, 4D contin...
Security is a fundamental topic for today's business solution systems. At 4D, we understand its importance; that's why we keep delivering features tha...
Following the ability to use your own end user management system and the SET USER ALIAS command, you might be wondering how you can manage end user pe...
As a 4D developer you often need to manage end users with your own directory system. For internal users, you might create a few profiles with differen...
For our customers running client-server applications on Windows, it is possible with 4D v15 R5 to enhance the end-user experience by using the Single ...
Got a question, suggestion or just want to get in touch with the 4D bloggers? Drop us a line!
* Your privacy is very important to us. Please click here to view our Policy