A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is
The article deals with the possibilities of protecting corporate applications that have been built on the K2 five platform. using new functions that provide an authorization package. Security settings are made with the new tools provided by the authorization framework. The peculiarities of setting up and implementing the benefits of this type of protection are considered. The expediency of using built-in roles for organizing of access to system resources is substantiated. Described how todoi:10.23856/3104 fatcat:wy3sydynxrgkbdnazfkzrvwmzu