Security Management

"Security Management" Doc in this DirectoryThere are 8 docs under this directory.Create a Doc in this Directory
Security Protection
Author:ayuan0625      Create Time:07-23 11:34      Tag:      Edit:29 Times    |   View:851 Times

Summary:OverviewVersionReport Server VersionFunctional Change11.0/11.0.12Added the Referer validation functio[Full Text:]

User Input Verification
Author:_339541      Create Time:06-08 15:02      Tag:      Edit:4 Times    |   View:232 Times

Summary:OverviewVersionReport Server VersionFunctional Change11.0.16/Application ScenariosThe server-end will[Full Text:]

Data Desensitization
Author:mt6666      Create Time:03-08 11:29      Tag:      Edit:1 Times    |   View:404 Times

Summary:OverviewVersionsReport Server VersionFunction ChangesV11.0.13Added the Data   Desensitization fu[Full Text:]

Iframe Calling Report From Different Domains Reporting Error
Author:ayuan0625      Create Time:04-11 14:41      Tag:      Edit:3 Times    |   View:438 Times

Summary:I. Problem descriptionWhen integrating fr reports on third-party system pages, the integration m[Full Text:]

10.0 Security Basic Configuration
Author:ayuan0625      Create Time:10-26 14:11      Tag:      Edit:11 Times    |   View:422 Times

Summary:转至元数据起始I. OverviewThe new 10.0 version also brings new features to users: military security, high ava[Full Text:]

Security Management
Author:ayuan0625      Create Time:07-20 17:35      Tag:      Edit:8 Times    |   View:3518 Times

Summary:I. OverviewIn order to ensure the security of enterprise applications, the report improves applicatio[Full Text:]

Access Control
Author:ayuan0625      Create Time:07-23 12:02      Tag:      Edit:12 Times    |   View:519 Times

Summary: I. OverviewThe Access Control feature is aimed to limit the frequency of single IP access and r[Full Text:]

Anti-SQL Injection
Author:ayuan0625      Create Time:10-12 10:15      Tag:      Edit:14 Times    |   View:1136 Times

Summary:I. Overview1) SQL injection generally means to trigger background execution of SQL query through mali[Full Text:]