What About Security Data?

This section explains how to run the VPLMPosImport batch tool.

In this release, security data is authored using standard ENOVIA V6 tools such as the Business application or the MQL interpreter: no support for this type of data is provided by the VPLMPosImport tool.

Security Objects

Security objects involved in the definition of security accesses are (the list is not exhaustive):


  • policies
  • rules
  • filters
  • expressions.

These objects make it possible to tailor particular security schemes, including P&O object-specific access, access grouping and access inheritance. Please refer to ENOVIA V6 documentation (e.g. Business Modeler Guide) for details concerning the ENOVIA V6 security model.

In order to perform massive data import, a VPLM administrator should take advantage of MQL scripting, i.e. write text-based import files containing MQL statements, and execute these files using the command-line MQL interpreter.

Note: while the import batch exposes P&O business objects, ENOVIA V6 security applies to P&O administrative objects. As a consequence, when defining security accesses for P&O objects in the Business application or MQL scripts, the VPLM administrator will not manage business persons, contexts, organizations, projects or roles, but administrative persons or roles.

Each administration role object has a particular property type that indicates whether it represents a business context, organization, project or role. Since properties cannot be viewed from the Business application, it may not be possible to distinguish "context" roles from "organization" roles, for instance, in that application. The MQL interpreter provides full access to that information and may preferably be used instead in order to author security data.

Please refer to ENOVIA V6 administration documentation (for example, the ENOVIA V6 Query Language (MQL) Guide) for details concerning the MQL syntax of security commands.

Expressions

The following table lists the expressions are delivered via the ENOVIA VPM Multi-Discipline Collaboration Platform and can be used as security filter expressions in policies and rules:

Expression name Description
MyData User is allowed to access his/her own data
MyOrgData User is allowed to access data owned by organizations of his/her assigned security contexts
MyPrjData User is allowed to access data owned by projects of his/her assigned security contexts