Tuesday, July 24, 2018

Data Security Policy Concepts

When developing a data security policy, you need to become familiar with
several concepts, such as constrained tables, primary tables, policy queries, and
context. This section outlines these concepts.


Constrained table: A constrained table is the table or tables in a
given security policy from which data is filtered or secured, based on
the associated policy query. For example, in a policy that secures all
sales orders based on the customer group, the SalesOrder table would
be the constrained table. Constrained tables are always explicitly
related to the primary table in the policy.


Primary table: A primary table is used to secure the content of the
related constrained table. For example, in a policy that secures all
sales orders based on the customer group, the Customer table would
be the primary table.


Policy query: A policy query is used to secure the constrained tables
specified in a given extensible data security policy. This query will
return data from a primary table that is then used to secure the
contents of the constrained table.


Context: A policy context is a piece of information that controls the
circumstances under which a given policy is considered to be
applicable. If this context is not set, then the policy, even if enabled,
is not enforced. Contexts can be of two types:


o A role context enables policy application based on the role or
roles to which the user has been assigned.


o An application context enables policy application based on
information set by the application.


Regards,
Hossein Karimi

No comments:

Post a Comment

Configure the Firewall on the Enterprise Portal Server

After you install Enterprise Portal, enable Web Server (HTTP) in Windows Firewall. If you do not enable the web server in Windows Firewall...