Table of Contents

Search

  1. Preface
  2. Introduction to MDM Hub Security
  3. Resources
  4. Roles
  5. Users and User Groups
  6. Security Providers
  7. Application Level Security
  8. Certificate-Based Authentication
  9. Password Hashing
  10. Appendix A: Glossary

Configuration of Resource Groups

Configuration of Resource Groups

You can use the Secure Resources tool to define resources groups and create a hierarchy of resources. You can then use the Roles tool to assign privileges to multiple resources in a single operation.
The Secure Resources tool differentiates visually between resources that belong directly to the current resource group and resources that belong indirectly. Resources explicitly added to a resource group have direct membership. Resources that belong to a resource group that was added to a resource group have indirect membership.
For example, you want to have two resource groups:
  • Resource Group A contains the Consumer base object, which means that the Consumer base object is a direct member of Resource Group A.
  • Resource Group B contains the Address base object.
  • Resource Group A contains Resource Group B, which means that the Address base object is an indirect member of Resource Group A.
In this example, the Address base object is unavailable when you edit Resource Group A. You must edit Resource Group B to edit the Address base object.

0 COMMENTS

We’d like to hear from you!