I had two enterprise customers this week who both had similar security requirements, and both sets of requirements were solved with a similar pattern that I thought you might find useful.
Imagine your company organizes itself into different groups...(read more)
↧