[1445] in SAPr3-news

home help back first fref pref prev next nref lref last post

Re: THE authorization Concept. (R3)

daemon@ATHENA.MIT.EDU (greywolf@wco.com)
Sat Jun 1 23:37:58 1996

To: sapr3-news@MIT.EDU
Date: 29 May 1996 05:38:44 GMT
From: greywolf@wco.com
Reply-To: greywolf@wco.com

At my company, we establish what we call role profiles.  These are, technically,
a composite profile that are directly related to a generic role assigned to an end
user by the configuration staff.  

For each of these role profiles, the configurators list all the transactions that 
each role needs.  Based on this list we (security administrators) define 
authorizations needed to satisfy each transaction.  We then group the 
authorizations into simple profiles that satisfy one (or possibly two or three)
transactions.  We then assemble the list of profiles that are needed to run
the list of transactions into the role (composite) profile. 

This way if you ever need to remove access, all you need to do is remove the
simple profile that governs that transaction.

It would also be a good idea to keep an "encyclopedia" of the many simple 
profiles that are created.  This will help the team practice reuse of knowledge,
rather than build many identical profiles with different naming conventions.
Not to mention save time and money.

Regards,
Matthew Burry

home help back first fref pref prev next nref lref last post