Table of Contents

Search

  1. Preface
  2. Introduction
  3. IDD Concepts
  4. Implementation Process
  5. IDD Configuration Manager
  6. Manual IDD Configuration
  7. IDD Global Properties
  8. Appendix A: Sizing and Platform Requirements
  9. Appendix B: Application Components
  10. Appendix C: IDD Security Configuration
  11. Appendix D: Data Security
  12. Appendix E: Example Role-Based Security Configuration
  13. Appendix F: Data Masking
  14. Appendix G: Siperian BPM Workflow Engine
  15. Appendix H: Locale Codes
  16. Appendix I: Troubleshooting
  17. Appendix J: Glossary

Data Director Implementation Guide

Data Director Implementation Guide

Object and Task Security

Object and Task Security

It is useful to think of IDD security in two broad categories:
  • Object security: Access to subject area data, and the ability to perform operations on that data (such as view, create, update, and merge) in IDD.
  • Task security (workflow). Access to tasks and actions based on roles that are defined in the workflow.
Although this example scenario focuses on object security only, many of the ideas are also applicable to task security in IDD, as task security depends on SAM as well.

0 COMMENTS

We’d like to hear from you!