-
Accessing the application
-
Application security
-
Devices and communication protocol
-
Application access control levels
-
Employees, departments and device users
-
Time & Attendance Functionality
-
Access control
-
Batches & payroll integration
-
Binary City Time API (Application Programming Interface)
-
Binary City Time integration with BioTime Technical Documentation
Firewalls and other methods
Firewalls and other methods
The exact details of the security methods used cannot be divulged in this document, but an overview will be provided here in very high level:
Privately accessible | Publicly accessible | ||
Description | Port 80 | Port 443 | |
Database instance | Y | ||
Front-end instance | N | Y | |
Communication instance | N | Y |
The setup is done in such a way, that only what may be accessed from public, can be accessed, and only via the ports that we allow.
Rating
0
0
Nenhum comentário até agora.
Join this Course
to be the first to leave a comment.
Share This Content
Partilhar Hiperligação
Share on Social Media
Share by Email
Please iniciar sessão to share this Article by email.