| 5 | |
| 6 | We want to be able to provide a simple way of setting the overall security policy - allowing for flexible deployment options. |
| 7 | * Anonymous access is granted for all Read operations, with Create/Update/Delete requiring a user to be Authenticated |
| 8 | * Self-Registration possible |
| 9 | * Self-Registration not possible |
| 10 | * Anonymous access isn't granted for anything - all access requires a user to be Authenticated |
| 11 | * Modules able to be restricted by Role membership |
| 12 | * Tables able to be restricted by Role membership |
| 13 | * C/R/U/D permissions distinct |
| 14 | * Records able to be restricted by Role membership |
| 15 | * C/R/U/D permissions distinct |
| 16 | |