Table of Contents

Search

  1. Preface
  2. Introduction
  3. IDD Concepts
  4. Implementation Process
  5. IDD Configuration Manager
  6. Manual IDD Configuration
  7. IDD Global Properties
  8. Appendix A: Sizing and Platform Requirements
  9. Appendix B: Application Components
  10. Appendix C: IDD Security Configuration
  11. Appendix D: Data Security
  12. Appendix E: Example Role-Based Security Configuration
  13. Appendix F: Data Masking
  14. Appendix G: Siperian BPM Workflow Engine
  15. Appendix H: Locale Codes
  16. Appendix I: Troubleshooting
  17. Appendix J: Glossary

Step 8. Configure Security

Step 8. Configure Security

All application security in IDD is controlled by Informatica MDM Hub Security Access Manager (SAM) policies configured in the Hub Console.
IDD application behaviors can be very sensitive to the security configuration.
  1. We recommend using the admin user (or a user with full privileges to all secure resources) for the configuration of an IDD application and the initial functional tests.
    For more information, see "Setting Up Security" in the
    Informatica MDM Hub Configuration Guide
    or Hub Console online help.
  2. Row-level security filters can be configured for each subject area. By default, no security filters are defined.
    On the Search tab in the subject area dialog box, you can configure data security rules.
  3. For any given IDD application user, there may be several data filters that apply.
    For example, a user may have rights to records with an address in CA via one role, and rights to records with an address in NY via another role. All applicable security filters are joined by a logical OR. If an IDD application user is assigned to a role that has no filter defined, no filters are applied, and therefore this user has access to all data.

0 COMMENTS

We’d like to hear from you!