Table of Contents

Search

  1. Preface
  2. Introduction
  3. IDD Concepts
  4. Implementation Process
  5. IDD Configuration Manager
  6. Manual IDD Configuration
  7. IDD Global Properties
  8. Sizing and Platform Requirements
  9. Application Components
  10. IDD Security Configuration
  11. Data Security
  12. Example Role-Based Security Configuration
  13. Data Masking
  14. Siperian BPM Workflow Engine
  15. Locale Codes
  16. Troubleshooting
  17. Glossary

Data Director Implementation Guide

Data Director Implementation Guide

Check Your SAM Configuration

Check Your SAM Configuration

Verify that SAM has the correct permissions assigned at all levels necessary in accordance with the documentation.
Areas to check for CRUD include:
  • If cross-references and changes histories are required, with buttons enabled in the IDD application, then the appropriate metadata content (XREF and HIST objects) are SECURE resources and are also configured accordingly.
  • Queries/Packages - Ensure that resources are made SECURE. Otherwise, an IDD application might not allow access to the entire subject area.

0 COMMENTS

We’d like to hear from you!