Audit Logging via Hibernate Interceptor (1/2)
One common requirement in developing enterprise applications is to ensure audit logs are available for data security and traceability. Who made the changes, when and where. Such requirement is not only dictated by corporate IT policies but is also required by government laws. Considering most enterprise applications have at least 50 domain objects…
read more...