Web access control: perform Manual and automatic backups

What is B/2 Web Access Control?

B/2 Web Access Control is a security concept designed to manage and restrict web application and service access. It forms part of a larger category of web security frameworks and mechanisms. Ensure only authorized users can access specific resources or functionalities within a system. By controlling how users interact with a web application. Helps protect sensitive data, prevent unauthorized actions. Ensure that the appropriate levels of security are maintained across the system.

We share a folder from Windows:

Create a folder in the directory where the system backup is located.

Enter the main menu by right clicking on the created folder then menu >> Propieties >> Sharing >> Advanced Sharing. Select “Share this folder”

Then we click on >> Permissions >> Everyone >> Full Control. We accept with OK in all the windows.

B/2 Web Access Control” refers to a specific model or approach within web application. Security that manages access to resources based on predefined policies. Although the name itself may refer to a proprietary or specialized framework used in specific environments, the principles it incorporates align closely with common access control strategies in web security.

In general, B/2 Web Access Control emphasizes two key components: Authentication and Authorization:

Authentication:

is the process of verifying the identity of a user attempting to access a resource. This typically involves asking users to provide credentials (such as a username and password or more advanced authentication factors like biometrics or multi-factor authentication). Authentication aims to confirm that the user is who they claim to be.

Authorization:

is the process that occurs after successful authentication. It determines what actions the authenticated user is allowed to perform. For example, an authorized user might be permitted to view specific data but not modify it. Authorization ensures that users only have access to the resources necessary for their role and responsibilities, thus preventing unnecessary exposure of sensitive information.

Now we only need to assign the security so that the Access control systems can use this directory to make the backups, this is done in the same menu, but in the option >> Security >> Edit >> Add the group Everyone and assign all the permissions.

Now we only must enter the administration of the Access control systems in >> System >> Database Backup. We copy the sharing path and paste it in the option as shown in the Access control image and then click on “Backup Now”.

Securing web applications and services is a critical concern for organizations in the era of digital transformation. B/2 Web Access Control provides a structured and effective way to ensure that only authorized users can access certain resources, reducing the risk of data breaches and unauthorized actions. Through principles like Role-Based Access Control, the Least Privilege Principle, Separation of Duties, and continuous monitoring, this system ensures that web applications remain secure while maintaining flexibility and compliance with relevant regulations.

Automatic backup

For the automatic backup we only have to activate the “Open” button, then we place the date and time of start of the Backup and in Backup Interval, we place the time in minutes of how often the backup should be done automatically, in the example it would be 21600 minutes = Every 15 days.

Share:

Facebook
Twitter
Pinterest
LinkedIn
On Key

Related Posts