Object access control is implemented using security masks. Security masks specify and secure the access authorizations to PLM objects and their attributes.
A mask can be defined succinctly as a set of access control information (ACI) for entities and attributes. Masks are set up by the PLM administrator, and are associated to security contexts, roles, projects or organizations.
The purpose of a mask is to filter the user interface of PLM applications for either customization or security reasons to provide finely tuned object access control. A mask controls which object attributes are visible in create, query, browse, and edit views, and which are modifiable or not. Masks also let you customize other attribute characteristics such as default values and authorized or help values.
After installation the only existing & deployed mask is the mask named DEFAULT.
You can also create your own masks. The default mask is suitable for the majority of security purposes. If this mask does not meet your object access security needs, we recommend that you create other masks for this purpose.
The default mask is not associated with any particular security context.
An entity is a type of PLM object. You control access to the PLM object's attributes via the use of a mask. Masks reference entities. Entities not defined in a mask are not masked: this means that all their attributes are visible and accessible, according to IP Protection rules.
This DEFAULT mask references a list of entities (PLM objects) that are controlled by the mask. It is always active: it cannot be replaced by another mask, and MUST NOT be deleted. Entities not referenced by the default mask are not controlled by this mask but may be controlled by a customer-defined mask.
Nothing prevents you physically from modifying or customizing the default mask. However, we recommend that you do not. If you do, and then install, for example, a higher hot fix level, the default mask will be overwritten and you will lose your changes.
To prevent from any issue, we recommend associating mask information to each entity.
There are 7 pre-defined access operations on attributes:
- Create
- Query
- EZQuery
- Read
- Write
- Tree
- List.
Note:
"List" is not currently used and is reserved for future use.