Skip to main content
Announcements
SYSTEM MAINTENANCE: Thurs., Sept. 19, 1 AM ET, Platform will be unavailable for approx. 60 minutes.
cancel
Showing results for 
Search instead for 
Did you mean: 
Not applicable

Help


what is the diffrent types of Authentication & Autherzation techniques. ? In which scenario what technique should use? Can anyone explain with example?

1 Solution

Accepted Solutions
Kushal_Chawda

See the attached document

View solution in original post

3 Replies
Kushal_Chawda

See the attached document

Peter_Cammaert
Partner - Champion III
Partner - Champion III

A Qwick Tip: read this QlikCommunity Tip: How to get answers to your post?

Adding a correct subject line and suitable tags to your post will get you more quality answers and may maker your Q&A useful for other people as well.

Thanks.