29Haz
Encrypted log entries authorization
We have a database table of encrypted log entries, each encrypted entry containing information about the user who created the entry. The entry is encrypted with the encryption key of the particular user.
Users may login into web GUI and e…