Prevent unauthorized access to systems
Cyberattacks and other forms of unauthorized access pose a constant threat to IT systems. Fortunately, many tools are available to counter these threats and shield your infrastructure.
In this section:
Authenticate users and devices
Authentication is the process of verifying the identity of a user, device, or other entity before granting access to a system, application, or network.
HostAccess is a client application. Authentication is handled by the host Pick system. For example, a host system can be a UniData database. HostAccess can provide a username and password when connecting to any supported host that requires authentication. The host can be running on UniVerse, Ultimate, or other Pick databases.
Implement logging
Logging can be implemented to gather operational and security data for a system, identify performance and security issues, and minimize the risk of data breaches.
HostAccess does not support logging by default. However, a trace file can be generated for troubleshooting purposes to log all data sent to and received from the server. To avoid exposing sensitive data, do not distribute trace files. Delete them when troubleshooting is completed. For more information about traces, see Traces.