Rational Clear Quest Security Settings (Translation) (1)

xiaoxiao2021-03-06  43

1 Set a security system The following figure describes the various elements of the CQ security policy. User membership is defined by the user group, and the user group and a specific customer are defined, each Defect record involves one and more client records.

If you use the structure described above in CQ, the process corresponds to the end user, its process is: User A is logged in to CQ, and User A is a member of Group A, group A and Customera associated. When User A needs to perform a query or request a record, the CQ automatically filters all DEFECT according to the security context of Customra. Only records belonging to Customera are listed. Here is an example to describe how to hide the record in CQ. There are three Customer: Logic Equipment, Widgets INC, and Modern Software. We need to control the Defect record so that Customers can access the database to complete the following tasks: Submit Defect Checking their DEFECT status, by performing a predefined good query or create a new query. Edit them existing Defect. When MODERN Software is logged in, they do not allow them to see Defect submitted by Widgetsinc, or quee submitted. When Modern Software creates a query at the CQ client, only the information submitted by MordernsoftWare can be queried. This example describes the following processing: Checkout A SCHEMA Creates a SERCURITY CONTEXT domain to add a security domain to the FORM Effects of SCHEMA Creating a User Group Submitting the Security Context Recording Group and Each Security Contempted Edit Record Removal Implion To group . These operations require certain user privileges, and you must have superuser privileges. to be continued. .

转载请注明原文地址:https://www.9cbs.com/read-57694.html

New Post(0)