Saturday, January 14, 2012

MDM Security and Permissions

MDM Security and Permissions:

MDM Security and User Administration is maintained in the MDM Console, per repository, under the Admin node.
Four MDM tables are utilized for MDM Security and User Administration: Roles, Users, Logins and Change Tracking. These tables are part of the MDM System tables. They are situated under the Admin node and generated by the system upon creation of a repository. These tables cannot be deleted.
A traditional SQL DBMS allows you to define basic user-level security to prevent unauthorized access to the database. You can specify the tables to which each user has access, granting at the table level either:
• No access to the table
• Complete read/write access to the table, including access to all of its fields and records
By contrast, MDM supports a more flexible, multidimensional security scheme that provides more granular control over which users can access an MDM repository, which functions they can perform, and which tables, fields, and records they can access.
The MDM security scheme is configured in the MDM Console and includes the following components:
• Users
• Roles
­ Privileges
­ Constraints
• Logons
• Change tracking
• Password access to the MDM Console

3 comments:

Unknown said...

Nice Blog post. Thanks for sharing great information.very good job.
SAP HANA online Training
SAP S/4 HANA training online
SAP UI5 Online Training in India
sap fiori training online
sap fico training online

Unknown said...

This site has lots of advantage. I found many interesting things on this site. It helps me in many ways. Thanks for posting this again. For more details Oracle related courses please check our website.
Oracle Fusion SCM Training in Hyderabad

Mithun said...

Useful Blog SAP Training in Chennai

Latest updates from sdn.sap.com

SAP Developer Network Latest Updates