| | 5 | |
| | 6 | We want to be able to provide a simple way of setting the overall security policy - allowing for flexible deployment options. |
| | 7 | * Anonymous access is granted for all Read operations, with Create/Update/Delete requiring a user to be Authenticated |
| | 8 | * Self-Registration possible |
| | 9 | * Self-Registration not possible |
| | 10 | * Anonymous access isn't granted for anything - all access requires a user to be Authenticated |
| | 11 | * Modules able to be restricted by Role membership |
| | 12 | * Tables able to be restricted by Role membership |
| | 13 | * C/R/U/D permissions distinct |
| | 14 | * Records able to be restricted by Role membership |
| | 15 | * C/R/U/D permissions distinct |
| | 16 | |