Prev  Up  Next
Chapter 5. What is Veil2 And What Does It Provide?  Home  Part II. Creating Your Veil2-based VPD Step By Step

You could be forgiven for thinking, given Veil2's capability and sophistication, that it would be difficult to set-up and use. But this is not the case. It is not trivial and it does require you to develop a deeper understanding of your data than you might choose, but the process is well documented and each individual step is simple enough.

The best way to get a grip on the complexity and amount of effort that would be required is to look at the demo apps.

In the spirit of expecting resistance, what follows is a list of imagined criticisms of Veil2 with appropriate responses. This is in place of a FAQ since, at the time of writing, no-one has asked any questions.

It’s easy to criticize relational security systems and implementations as they are not widely used and are worryingly novel. Here are a few criticisms that have been directed at Veil2-like implementations.


Prev  Up  Next
Chapter 5. What is Veil2 And What Does It Provide?  Home  Part II. Creating Your Veil2-based VPD Step By Step