Table of Contents

Search

  1. Preface
  2. Introduction
  3. IDD Concepts
  4. Implementation Process
  5. IDD Configuration Manager
  6. Manual IDD Configuration
  7. IDD Global Properties
  8. Appendix A: Sizing and Platform Requirements
  9. Appendix B: Application Components
  10. Appendix C: IDD Security Configuration
  11. Appendix D: Data Security
  12. Appendix E: Example Role-Based Security Configuration
  13. Appendix F: Data Masking
  14. Appendix G: Siperian BPM Workflow Engine
  15. Appendix H: Locale Codes
  16. Appendix I: Troubleshooting
  17. Appendix J: Glossary

Data Director Implementation Guide

Data Director Implementation Guide

Configure Secure Resources (Secure Resources Tool)

Configure Secure Resources (Secure Resources Tool)

For IDD to have access to a resource, it must be flagged as SECURE in the Secure Resources tool.
You must make sure that all of the design objects configured earlier are configured as SECURE resources.
  • Party base object, including associated:
    • match rule sets, which are used in IDD for Search for Duplicates (potential matches)
    • content metadata (HISTORY, RAW, and XREF), which are used in IDD to display the change history, cross references, and raw records
  • cleanse functions used for data entry
  • packages used for Search results
  • Consider creating resource groups to organize IDD-accessible resources and to expedite security configuration.
  • If you want to prevent all IDD users from having access to a certain resource, make it PRIVATE. For example, you could globally hide IDD access to RAW records in this way.

0 COMMENTS

We’d like to hear from you!