Table of Contents

Search

  1. Preface
  2. Introduction
  3. IDD Concepts
  4. Implementation Process
  5. IDD Configuration Manager
  6. Manual IDD Configuration
  7. IDD Global Properties
  8. Appendix A: Sizing and Platform Requirements
  9. Appendix B: Application Components
  10. Appendix C: IDD Security Configuration
  11. Appendix D: Data Security
  12. Appendix E: Example Role-Based Security Configuration
  13. Appendix F: Data Masking
  14. Appendix G: Siperian BPM Workflow Engine
  15. Appendix H: Locale Codes
  16. Appendix I: Troubleshooting
  17. Appendix J: Glossary

Data Director Implementation Guide

Data Director Implementation Guide

Step 8. Configure Security

Step 8. Configure Security

All application security in
Data Director
is controlled by MDM Hub Security Access Manager (SAM) policies configured in the Hub Console.
Data Director
application behaviors can be very sensitive to the security configuration.
  1. To configure and test the application for
    Data Director
    , use the admin user or a user with full privileges to all secure resources.
    For more information, see the
    Multidomain MDM Security Guide
    .
  2. For each subject area, you can configure row-level security filters. By default, no security filters are defined.
    On the Search tab in the subject area dialog box, you can configure data security rules.
  3. For any given user, the assigned user roles might include several data filters.
    For example, a user might have rights to records with an address in CA via one role, and rights to records with an address in NY via another role.

0 COMMENTS

We’d like to hear from you!