Table of Contents

Search

  1. Preface
  2. Introduction
  3. IDD Concepts
  4. Implementation Process
  5. IDD Configuration Manager
  6. Manual IDD Configuration
  7. IDD Global Properties
  8. Appendix A: Sizing and Platform Requirements
  9. Appendix B: Application Components
  10. Appendix C: IDD Security Configuration
  11. Appendix D: Data Security
  12. Appendix E: Example Role-Based Security Configuration
  13. Appendix F: Data Masking
  14. Appendix G: Siperian BPM Workflow Engine
  15. Appendix H: Locale Codes
  16. Appendix I: Troubleshooting
  17. Appendix J: Glossary

Data Director Implementation Guide

Data Director Implementation Guide

IDD, Security Access Manager (SAM), and Services Integration Framework (SIF)

IDD, Security Access Manager (SAM), and Services Integration Framework (SIF)

Most IDD functionality is implemented using SIF calls.
SIF requires SAM configuration, which is highly granular, to provide the rights and privileges needed to run the SIF calls. SAM configuration involves defining the users, roles, secure resources, and privileges required to support role-based access to data and operations.

0 COMMENTS

We’d like to hear from you!