Login Introduction
Previous Topic  Next Topic 


Description


DEXIT security aims to provide program-level-security using today's security "best practices'. It allows the customer to control who can use DEXIT , and what aspects of the program they can use.


The key goals here are flexibility (every end user has different policies) and usability (customers need to be able to manage their own security and not rely on the developer to do it for them.)


In addition large customers have different needs to small customers (such as Active Directory integration) and so DEXIT is designed to be flexible, allowing customers to tailor the security to their needs.


A range of features, including password resets, self-sign-on, guest accounts and more make DEXIT the last security tool you will need.


When you log in to DEXIT, you use a username and password. Different customers have different needs, and the platform you're using (like a desktop or web app) might have special requirements.


We aimed to create the best, safest, and feature-packed login system that is also easy to set up and use. The result is the most comprehensive login system available for DEXIT. 


Every part of the login system can be customized to suit each customer's needs and policies. 


Here are some of the key features: