Table of Contents

Search

  1. Preface
  2. Introduction
  3. IDD Concepts
  4. Implementation Process
  5. IDD Configuration Manager
  6. Manual IDD Configuration
  7. IDD Global Properties
  8. Sizing and Platform Requirements
  9. Application Components
  10. IDD Security Configuration
  11. Data Security
  12. Example Role-Based Security Configuration
  13. Data Masking
  14. Siperian BPM Workflow Engine
  15. Locale Codes
  16. Troubleshooting
  17. Glossary

Data Director Implementation Guide

Data Director Implementation Guide

Hierarchy Manager

Hierarchy Manager

If Hierarchy Manager (HM) is configured for an ORS, you can configure an IDD application to work with this configuration.
Configure the IDD application according to the following rules:
  • Any HM entity that an IDD application uses must be configured as a subject area in the IDD Configuration Manager. HM is used to model the relationships between subject areas.
  • An IDD application operates against a single HM configuration (profile/sandbox combination). IDD uses the SAM access control configuration, rather than different HM configurations, to manage user access control. The HM configuration used by an IDD application must include all HM entity and relationship types to be used in the IDD application.

0 COMMENTS

We’d like to hear from you!