Table of Contents

Search

  1. Preface
  2. Introduction
  3. IDD Concepts
  4. Implementation Process
  5. IDD Configuration Manager
  6. Manual IDD Configuration
  7. IDD Global Properties
  8. Sizing and Platform Requirements
  9. Application Components
  10. IDD Security Configuration
  11. Data Security
  12. Example Role-Based Security Configuration
  13. Data Masking
  14. Siperian BPM Workflow Engine
  15. Locale Codes
  16. Troubleshooting
  17. Glossary

Data Director Implementation Guide

Data Director Implementation Guide

Configure Secure Resources (Secure Resources Tool)

Configure Secure Resources (Secure Resources Tool)

For IDD to have access to a resource, it must be flagged as SECURE in the Secure Resources tool.
You must make sure that all of the design objects configured earlier are configured as SECURE resources.
  • Party base object, including associated:
    • match rule sets, which are used in IDD for Search for Duplicates (potential matches)
    • content metadata (HISTORY, RAW, and XREF), which are used in IDD to display the change history, cross references, and raw records
  • cleanse functions used for data entry
  • packages used for Search results
  • Consider creating resource groups to organize IDD-accessible resources and to expedite security configuration.
  • If you want to prevent all IDD users from having access to a certain resource, make it PRIVATE. For example, you could globally hide IDD access to RAW records in this way.

0 COMMENTS

We’d like to hear from you!