Our software architecture

Our software architecture

Our vision of the software architecture is that it must be based on a layered organization in order to properly separate the functions and responsibilities of the software components. 

The software architecture of our platforms has the following characteristics: 

Loose coupling

Separation of responsibilities between different components that are weakly dependent on each other. 

 

Strong cohesion

Component specialization around a set of coherent responsibilities. 

The Three Tiers of the Software Architecture: 

1. The presentation tier

This tier is essentially composed of Web pages that will be presented to users. 

2. The business logic tier

This tier’s function is to process user requests and prepare information to be posted on the Web pages depending on the context. Its functions require this tier to interact with « Cyberjustice Core Services » or communicate with its own data access tier.

3.The data access tier

This tier provides access to the application’s data base, which holds information specific to the Web application itself. In particular, it could be composed of information to appear on menus and data on user sessions. 

Depending on their needs, applications can accommodate various types of users who, once duly registered, can access their files. After authentication, these users are given different roles and access rights depending on their organization and the application’s access rights management policy. 

Responsibility for user authentication is delegated to an authentication service that is separate from our software solutions. This way of proceeding ensures greater flexibility when integrating our software into the environments in which they will be deployed. 

Authentication services can be an Active Directory domain, a dedicated application using Windows Identity Foundation, or a Google, Facebook or Hotmail authentication service.  

This content has been updated on 10/25/2018 at 11 h 44 min.