Table of Contents

Search

  1. Preface
  2. Introduction to MDM Hub Security
  3. Resources
  4. Roles
  5. Users and User Groups
  6. Security Providers
  7. Application Level Security
  8. Certificate-Based Authentication
  9. Password Hashing
  10. Appendix A: Glossary

Internal Roles and External Roles

Internal Roles and External Roles

In a role-based centralized security implementation, you must create a mapping between the
MDM Hub
internal role and the external role that is managed separately from the
MDM Hub
.
The name of the external role name might differ from the internal role name used in a
MDM Hub
environment.
Configuration details depend on the role mapping implementation of the security provider. You map roles in a configuration file. You can map one external role to more than one internal role.
Although mappings are often created in XML, there is no predefined format for a configuration file. It might not be an XML file or even a file. The mapping is part of the custom user profile or authentication provider implementation. The purpose of the mapping is to populate a user profile object roles list with internal role IDs.

0 COMMENTS

We’d like to hear from you!