- Application Security
Use the database access control list (ACL) to restrict access that specific users and servers have to an application. You can also use the Advanced section of the ACL to further restrict application access for Web users.
- Design element security
Use the database access control list in conjunction with access control fields to restrict access that specific users and servers have to an application. You can also use access lists and special fields to restrict access to specific design elements within an application.
- Encryption and database signing
You can further ensure data privacy by encrypting a database with an ID so unauthorized users cannot access a locally stored copy of the database. You can also sign or encrypt mail messages users send and receive, and you can sign the database or template to protect design elements from manipulation from outside formulas.