<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Auhtentication vs authorization in QlikView</title>
    <link>https://community.qlik.com/t5/QlikView/Auhtentication-vs-authorization/m-p/577002#M214618</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is authentication and authorization in qlikview and what will come first authentication on authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Deepak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 15 Apr 2014 04:14:06 GMT</pubDate>
    <dc:creator>deepakqlikview_123</dc:creator>
    <dc:date>2014-04-15T04:14:06Z</dc:date>
    <item>
      <title>Auhtentication vs authorization</title>
      <link>https://community.qlik.com/t5/QlikView/Auhtentication-vs-authorization/m-p/577002#M214618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is authentication and authorization in qlikview and what will come first authentication on authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Deepak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2014 04:14:06 GMT</pubDate>
      <guid>https://community.qlik.com/t5/QlikView/Auhtentication-vs-authorization/m-p/577002#M214618</guid>
      <dc:creator>deepakqlikview_123</dc:creator>
      <dc:date>2014-04-15T04:14:06Z</dc:date>
    </item>
    <item>
      <title>Re: Auhtentication vs authorization</title>
      <link>https://community.qlik.com/t5/QlikView/Auhtentication-vs-authorization/m-p/577003#M214619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px;"&gt;Authentication verifies &lt;/SPAN&gt;&lt;SPAN style="color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px;"&gt;&lt;STRONG&gt;who you are&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px;"&gt;. For example, you can login into your Unix server using the ssh client, or access your email server using the POP3 and SMTP client&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px;"&gt;&lt;SPAN style="color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px;"&gt;Authorization verifies &lt;/SPAN&gt;&lt;SPAN style="color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px;"&gt;&lt;STRONG&gt;what you are authorized to do&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px;"&gt;. For example, you are allowed to login into your Unix server via ssh client, but you are not authorized to browser /data2 or any other file system&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #111111; font-size: 14px; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #111111; font-size: 14px; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif;"&gt;Authorization occurs after successful authentication.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #111111; font-size: 14px; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #111111; font-size: 14px; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H2 style="margin-top: 1.833em; margin-bottom: 0.611em; color: #111111; font-size: 1.286em; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif;"&gt;Example: Authentication And Authorization&lt;/H2&gt;&lt;P style="margin-bottom: 1.571em; color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px;"&gt;A user called vivek is allowed to login to www.cyberciti.biz server securely using the OpenSSH ssh client/server module. In this example authentication is the mechanism whereby system running at www.cyberciti.biz may securely identify user vivek. The authentication systems provide an answers to the questions:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Who is the user vivek?&lt;/LI&gt;&lt;LI&gt;Is the user vivek really who he represents himself to be?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;H3 style="margin-top: 1.833em; margin-bottom: 0.611em; font-weight: normal; font-size: 1.286em; color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif;"&gt;vivek is Authenticated? What Next?&lt;/H3&gt;&lt;P style="margin-bottom: 1.571em; color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px;"&gt;Authorization.&lt;/P&gt;&lt;P style="margin-bottom: 1.571em; color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px;"&gt;The Unix server running at www.cyberciti.biz determines what level of access a particular authenticated user called vivek should have. For example, vivek can compile programs using GNU gcc compilers but not allowed to upload or download files. So&lt;/P&gt;&lt;OL style="margin-bottom: 1.571em; margin-left: 1.571em; color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px;"&gt;&lt;LI&gt;Is user vivek authorized to access resource called ABC?&lt;/LI&gt;&lt;LI&gt;Is user vivek authorized to perform operation XYZ?&lt;/LI&gt;&lt;LI&gt;Is user vivek authorized to perform operation P on resource R?&lt;/LI&gt;&lt;LI&gt;Is user vivek authorized to download or upload files?&lt;/LI&gt;&lt;LI&gt;Is user vivek authorized to apply patches to the Unix systems?&lt;/LI&gt;&lt;LI&gt;Is user vivek authorized to make backups?&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2014 04:25:14 GMT</pubDate>
      <guid>https://community.qlik.com/t5/QlikView/Auhtentication-vs-authorization/m-p/577003#M214619</guid>
      <dc:creator />
      <dc:date>2014-04-15T04:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: Auhtentication vs authorization</title>
      <link>https://community.qlik.com/t5/QlikView/Auhtentication-vs-authorization/m-p/577004#M214620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nuthan has done that in best way .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2014 04:28:12 GMT</pubDate>
      <guid>https://community.qlik.com/t5/QlikView/Auhtentication-vs-authorization/m-p/577004#M214620</guid>
      <dc:creator>sujeetsingh</dc:creator>
      <dc:date>2014-04-15T04:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: Auhtentication vs authorization</title>
      <link>https://community.qlik.com/t5/QlikView/Auhtentication-vs-authorization/m-p/577005#M214621</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;Thanks for reply.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;This mean authorization comes first is it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2014 04:33:23 GMT</pubDate>
      <guid>https://community.qlik.com/t5/QlikView/Auhtentication-vs-authorization/m-p/577005#M214621</guid>
      <dc:creator>deepakqlikview_123</dc:creator>
      <dc:date>2014-04-15T04:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: Auhtentication vs authorization</title>
      <link>https://community.qlik.com/t5/QlikView/Auhtentication-vs-authorization/m-p/577006#M214622</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No Deepak,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; background-color: #ffffee;"&gt;Authorization occurs after successful authentication.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; background-color: #ffffee;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; background-color: #ffffee;"&gt;Authentication comes first.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2014 04:36:11 GMT</pubDate>
      <guid>https://community.qlik.com/t5/QlikView/Auhtentication-vs-authorization/m-p/577006#M214622</guid>
      <dc:creator />
      <dc:date>2014-04-15T04:36:11Z</dc:date>
    </item>
  </channel>
</rss>

