With built-in security manager, a tenant admin can create and manage roles directly in a tenant; roles are commonly used in work flows and for digital signatures. See the Manage Roles topic for instructions on creating and managing roles.
With the LDAP Security Manager or Delegating Security Manager, groups are the equivalent of the roles created in tenants that use the built-in security manager. Please refer to the documentation for those security managers for information about creating users and groups (roles).
With ' built-in security manager, a tenant admin can create and manage users directly in a ' tenant. See the Manage Users topic for instructions on creating and managing users.
With the LDAP Security Manager or Delegating Security Manager, users and groups (which are equivalent to roles) are defined outside of .
has a built-in security manager that allows you to create users and roles directly in your tenant. Refer to this documentation for more information.
uses a more secure salted hash strategy for storing hashed user passwords. Salting a hash of passwords makes the password storage better protected from dictionary and brute force attacks.
uses a random salt value for each user's password and the salt changes whenever the password changes. In order for proper operation, older unsalted (i.e. bland) passwords are still supported. Passwords for new users and password changes for existing users will result in the creation of salted password hashes. The old passwords in the database (users table) are 28 characters in the hashed form.
Salted passwords are used in both the in-house and hosted versions of . Here are some features where a salted password is used:
New passwords are salted SHA-256 hashes. The SHA-2 family of algorithms for password hashing is more secure in the area of vulnerabilities. The total salt + hash size of these new format hashed passwords is 76 chars.
Access control allows more flexibility when the designer is assigning access to execute forms and flows, view/edit form/flow submissions and view the audit trail of an active flow. Access can be granted to users and/or roles in these three areas. Refer to this Access Control and Shared Items for the details.