MDM Security and Permissions:
MDM Security and User Administration is maintained in the MDM Console, per repository, under the Admin node.
Four MDM tables are utilized for MDM Security and User Administration: Roles, Users, Logins and Change Tracking. These tables are part of the MDM System tables. They are situated under the Admin node and generated by the system upon creation of a repository. These tables cannot be deleted.
A traditional SQL DBMS allows you to define basic user-level security to prevent unauthorized access to the database. You can specify the tables to which each user has access, granting at the table level either:
• No access to the table
• Complete read/write access to the table, including access to all of its fields and records
By contrast, MDM supports a more flexible, multidimensional security scheme that provides more granular control over which users can access an MDM repository, which functions they can perform, and which tables, fields, and records they can access.
The MDM security scheme is configured in the MDM Console and includes the following components:
• Users
• Roles
Privileges
Constraints
• Logons
• Change tracking
• Password access to the MDM Console
Saturday, January 14, 2012
Subscribe to:
Posts (Atom)