Table of Contents

Search

  1. Preface
  2. Introduction
  3. IDD Concepts
  4. Implementation Process
  5. IDD Configuration Manager
  6. Manual IDD Configuration
  7. IDD Global Properties
  8. Appendix A: Sizing and Platform Requirements
  9. Appendix B: Application Components
  10. Appendix C: IDD Security Configuration
  11. Appendix D: Data Security
  12. Appendix E: Example Role-Based Security Configuration
  13. Appendix F: Data Masking
  14. Appendix G: Siperian BPM Workflow Engine
  15. Appendix H: Locale Codes
  16. Appendix I: Troubleshooting
  17. Appendix J: Glossary

Data Director Implementation Guide

Data Director Implementation Guide

Create and Configure a New IDD Application (IDD Configuration Manager)

Create and Configure a New IDD Application (IDD Configuration Manager)

In the IDD Configuration Manager, create a new IDD application, and then configure it. Add a subject area group (such as Party Group), and then the Party subject area.
In this scenario, you would specify all Party columns, the Party match rule set to use for duplicate checks (must be configured as SECURE), and a cleanse function (must be configured as SECURE). When you are finished, save changes and deploy the IDD application.
One way to restrict user access to information is to specify only a subset of columns to display in the IDD GUI. Later, you can configure permissions for roles at the column level, allowing some users to see a column while others cannot.

0 COMMENTS

We’d like to hear from you!