Table of Contents

Search

  1. Preface
  2. Introduction
  3. IDD Concepts
  4. Implementation Process
  5. IDD Configuration Manager
  6. Manual IDD Configuration
  7. IDD Global Properties
  8. Appendix A: Sizing and Platform Requirements
  9. Appendix B: Application Components
  10. Appendix C: IDD Security Configuration
  11. Appendix D: Data Security
  12. Appendix E: Example Role-Based Security Configuration
  13. Appendix F: Data Masking
  14. Appendix G: Siperian BPM Workflow Engine
  15. Appendix H: Locale Codes
  16. Appendix I: Troubleshooting
  17. Appendix J: Glossary

Data Security in Task Data

Data Security in Task Data

IDD allows authorized users to participate in workflows, which are computer models of real work involving a series of operations or activities. IDD data security impacts the following task areas:
  • Check for view permissions - whether a task can be opened by a user or not. If the user is not allowed to open a task, a warning message is displayed to the user.
  • Filter out children data - which child records are seen by user on Data View.
  • Data security filters do not get applied on XREF data. For example, if a user has access to the primary object data and to its children data, then according to data security the user is allowed to see all the contributing XREFs.
  • The logic of applying data security filters depends on the type of task.

0 COMMENTS

We’d like to hear from you!