FrontBase logo

FrontBase Documentation

FrontBase logo

Backtrack:
  Welcome!
    3. FrontBase Specifications
      3.2. Key Features
Updated: 20-Nov-2000
prevnext
Table of Contents

3.2.2. FrontBase Security

FrontBase uses passwords, encryption, and client IP address checks to protect your data while in storage and in transit. This section gives an overview of security features.

Section/Article Description
3.2.2.1. Passwords FrontBase provides two layers of passwords for protecting access to databases: database passwords and user passwords. This article gives an overview of how they work.
3.2.2.2. Encryption FrontBase provides both datastore and communication link encryption. This article introduces FrontBase's encryption features.
3.2.2.3. IP Address Checks FrontBase implements black and white lists (also known as the "whiskey list") for determining which clients may connect. This article explains how that works.


If you have feedback or questions on this document, please send e-mail to doc-feedback@frontbase.com. Please reference the section number and topic. Thanks!!

©2000 FrontBase, Inc. All rights reserved.