Tuesday, July 24, 2018

Developing an Extensible Data Security Policy

Developing an extensible data security policy involves the following steps:

1. Modeling the query on the primary table.


2. Creating the policy.


3. Adding the constrained tables and views.


4. Setting the context.


However, before you start developing a policy, you must understand the
underlying requirements. You should identify the set of constrained tables and
analyze the relationships that these tables have with the primary table. You
should also analyze the data access patterns of the constrained tables, the table
sizes, and existing indexes on both the primary and constrained tables. All of
these aspects influence the impact that a policy will have on the performance of
the application.
 

NOTE: For more information about developing an extensible data security
policy, refer to the Developer Documentation.


Regards,
Hossein Karimi

No comments:

Post a Comment

Configure the Firewall on the Enterprise Portal Server

After you install Enterprise Portal, enable Web Server (HTTP) in Windows Firewall. If you do not enable the web server in Windows Firewall...