Dear (expert) Qlikies
The following questions sounds maybe a bit hypothetical, but i'm just interested to get an answer to it.
I'm seeking to secure my application as good as poosible, therefore section access is not to overcome. I'm pretty familar how section access is working and not, but one open question that is buzzing around my mind is:
If I secure my application with Section Access to prevent unauthorized usage, the application get stolen, then they are rebuilding my environment (same LDAP Directory, Same User) can he/she use the application in this replicated environment in spite of the section access?
Regards