-
Accessing the application
-
Application security
-
Devices and communication protocol
-
Application access control levels
-
Employees, departments and device users
-
Time & Attendance Functionality
-
Access control
-
Batches & payroll integration
-
Binary City Time API (Application Programming Interface)
-
Binary City Time integration with BioTime Technical Documentation
Firewalls and other methods
Firewalls and other methods
The exact details of the security methods used cannot be divulged in this document, but an overview will be provided here in very high level:
Privately accessible | Publicly accessible | ||
Description | Port 80 | Port 443 | |
Database instance | Y | ||
Front-end instance | N | Y | |
Communication instance | N | Y |
The setup is done in such a way, that only what may be accessed from public, can be accessed, and only via the ports that we allow.
Rating
0
0
There are no comments for now.
Join this Course
to be the first to leave a comment.