Application

Estimated reading: 3 minutes 285 views

An Application is a software program that has been integrated with Visual Guard for security management purposes. This integration allows the application to utilize Visual Guard’s comprehensive security features, including user authentication, authorization, role-based access control, and audit trails, directly from the WebConsole interface. The application leverages its framework to secure access, manage user roles and permissions, and enforce defined security policies, thereby ensuring that only authorized users can access sensitive functionalities and data within the application.

Below are the setting you can setup for your application.


1. Attendance Hours Chart

This shows the number of successfull and invalid attempts


2. Application Details

  • Name: The application name is displayed
  • Version: The version of the application
  • ID: The ID number of the application
  • Description: Here you get a few details about what the application is

3. Application Security

  • Anonymous Role: This refers to a predefined role assigned to users who access the application without authenticating themselves. This role allows unauthenticated users to perform specific actions or access certain parts of the application based on permissions associated with the Anonymous Role. It’s a way to manage and restrict what unauthenticated users can see or do within the application, ensuring that sensitive areas remain secure while still providing a level of access to public-facing features.
  • Anonymous System Role: This role is system-defined and automatically applied to all unauthenticated users, dictating what actions they can perform or what parts of the application they can access without having a registered account or identity within the system.
  • Default Role: These are predefined roles automatically assigned to all authenticated users upon login, unless specified otherwise. This role serves as a baseline set of permissions that apply to users by default, ensuring that every user has a minimum level of access and capabilities within the application.
  • Membership Access Level: Here you can categorize the access rights or permissions granted to users based on their membership in specific roles or groups within the application.

4. Contextual Settings

  • Group Selection Display Mode: This configures the presentation and selection of user groups, enhancing the ease of managing roles and permissions. This feature streamlines the assignment process, improving administrative efficiency in access control.
  • Group Selection Mode: Determines how administrators can select user groups for assigning roles and permissions, offering a simplified or detailed view to facilitate efficient management of user access rights.
  • Role Selection Display Mode: Here the system adjusts how roles are displayed and chosen, optimizing the interface for administrators to easily assign or modify user roles and their corresponding permissions.

5. Application Actions

  • Generate Config Files: Involves creating essential configuration files that define application settings and parameters. These files are pivotal for customizing and initializing the application’s runtime environment.
  • Remove: By clicking on the remove button the application will be removed from the repository.

Once you select your preferred setting click on Update for the settings to reflect