Implementing Sharing for User Reports with Authentication and Authorization

In this meeting, Rice is discussing the implementation of sharing reports in a user database. They are trying to understand whether to force users to create an account or allow them to view the report without editing privileges. They explore different authentication methods, such as using an authentication token or a URL with a unique ID. They also discuss the use of cloud convert and the need for authentication for accessing reports. The importance of authentication in ensuring only authorized users can access the data is highlighted. Multiple ways of implementing sharing, such as using magic links or email verification, are discussed, with a trade-off between security and convenience. Rice is leaning towards the convenience approach for sharing the reports.

(Source: Office Hours 3/22 )

State Change Members Can View The Video Here

View This Video Now

Join State Change Risk-Free