Table of Contents

Search

  1. Preface
  2. Introduction
  3. IDD Concepts
  4. Implementation Process
  5. IDD Configuration Manager
  6. Manual IDD Configuration
  7. IDD Global Properties
  8. Sizing and Platform Requirements
  9. Application Components
  10. IDD Security Configuration
  11. Data Security
  12. Example Role-Based Security Configuration
  13. Data Masking
  14. Siperian BPM Workflow Engine
  15. Locale Codes
  16. Troubleshooting
  17. Glossary

Data Director Implementation Guide

Data Director Implementation Guide

Example Role-Based Security Configuration Overview

Example Role-Based Security Configuration Overview

This appendix describes a simple scenario for setting up role-based access to secure resources in Informatica Data Director (IDD).
It introduces key concepts and walks through the security configuration tasks required to implement a sample scenario. The purpose of this appendix is to provide IDD implementers with some basic knowledge about what might be required to set up security in their IDD implementation projects.
This is not a lab tutorial for building a working sample application. It is simply a narrative walkthrough of the tools and tasks involved to support a given scenario.

0 COMMENTS

We’d like to hear from you!