About Custom Security Custom Security
5. In the Security Classification field, delete the current security level using the
keyboard or by selecting the blank line from list.6. Click OK.
6.3 Custom Security
Custom security is optional and are another layer of security in addition to supplemental markings see Supplemental Markings on page 6-2. Two types of custom security are available: ■ Simple custom security fields, where custom field are configured to be matched by a user rather than a designated supplemental marking. This is called custom supplemental markings in the DoD 5015 standard, ■ Advanced custom security, where security is applied to fields that use option lists. Security can be applied to individual items in the option list. Unlike supplemental markings, custom security is enforced at the item level. Supplemental markings are enforced at both the record folder and the item level. This section covers the following topics: ■ About Custom Security on page 6-17 ■ Managing Custom Security on page 6-18 ■ Simple Custom Security Field Example on page 6-216.3.1 About Custom Security
To work with custom security, you need to have one of the following rights: ■ Admin.Triggers : This right enables you to view information. ■ Admin.RecordManager : In addition to viewing information, this right also enables you to create add, edit, and delete custom security. A simple custom security field pairs a custom content field with a custom user field. For example, you can create a custom security field such as Project Name. Users must be assigned the appropriate project name or names to access or view an item assigned with custom security. If the match all setting is enabled, a user must be assigned to all the same projects as an item is assigned to for the user to access an item with multiple project assignments. If a user does not match all project names, the user cannot access an item. You can opt to select the match all feature for custom security fields just as you can with supplemental markings. Content is then checked in with one or more custom security field options, such as a particular project name, assigned to the content. For instance, user1 is assigned project name Pangea only. The user named user2 is assigned both project name Pangea and Tectonic. If content is checked in with multiple field options assigned for example, Pangea and Tectonic, then only a user with all project names assigned user2 can access that content. If the match all setting is disabled, then a user only must match one field option to access an item. Advanced custom security also limits access to content items. However, advanced security can also restrict access based on aliases as well as individual users. This type of security assigns security at the item level for option lists. When using this type of security, the only metadata that can be used is that which has an option list associated 6-18 Oracle Fusion Middleware Setup Guide for Universal Records Management with it. Access can then be restricted to individual items in the option list by limiting which accounts, which users, or which aliases of users can access specific options.6.3.2 Managing Custom Security
Parts
» Oracle Fusion Middleware Online Documentation Library
» About This Guide About This Product
» Regulatory Needs Litigation Needs Business Needs
» Content Retention Qualities Importance of Content Retention
» Internal and External Retained Content Classified, Unclassified, Declassified Content
» Non-Permanent, Transfer or Accession, and Reviewed Content
» Basic Retention Management Concepts
» Physical Content Management Interaction with Oracle UCM
» Basic Retention Processes Oracle Fusion Middleware Online Documentation Library
» Oracle UCM Security Considerations Oracle URM-WNA Redeployment
» Software Configuration Oracle Fusion Middleware Online Documentation Library
» Retention Setup Checklist Oracle Fusion Middleware Online Documentation Library
» Retention Management Options Oracle Fusion Middleware Online Documentation Library
» Supplemental Markings Classification Security Settings
» Security Classifications Classification Guides
» Security Settings Security Roles and Definitions
» Rights for Roles Security Overview
» System-Wide Configuration Setting Up Physical Content Management
» Creating a Series Creating a Retention Category
» Disposition Types Triggering Events
» Triggers Freezes Configuring Content Triggers, Dispositions, and Freezes
» Configuring the System Interface Overview
» Configuring Reports Configuring PCM
» Individual Page and Action Menus Menus
» Retention Management in an Organization
» Roles Oracle Fusion Middleware Online Documentation Library
» Folder Tasks and Defaults for Predefined Roles
» Chargeback Tasks and Defaults for Predefined Roles
» Security Groups Aliases Security Matrix
» Setting Security Preferences Oracle Fusion Middleware Online Documentation Library
» The Series Tab The Category Tab Folder Tab
» Specifying PCM Barcode Values for Users
» Supplemental Markings Details Supplemental Markings
» Classification Levels About Records Classification
» About Custom Security Custom Security
» PCM Options Oracle Fusion Middleware Online Documentation Library
» Workflow Prerequisites and Process
» Configuration with Desktop Integration Suite About Physical Content Management
» Predefined Location Types Creating or Editing a Location Type
» Viewing Location Type Information Deleting a Location Type Reordering Location Types
» Example: Creating a Location Type
» Predefined Object Types Creating or Editing an Object Type Viewing Object Type Information
» Setting Default Metadata Values for Reservation Items and Offsite Storage
» Configuring Chargeback Processing Storage Space Considerations
» Location Type Object Type Media Type Storage Status
» Creating a Storage Location Batch Creating Storage Locations
» Editing a Storage Location Viewing Information about a Storage Location
» Deleting a Storage Location Blocking a Storage Location
» Example: Creating a Single Storage Location Example: Creating a Batch of Storage Locations
» Retention Schedules and File Plans
» Retention Schedule Hierarchy Planning a Retention Schedule
» Attribute Inheritance Review Status Attributes
» Permanent Status Attributes Disposition Instructions Frozen Folder and Content Status
» Retention Schedule Menus Creating and Navigating Object Levels
» About Record Folders Record Folders
» Retention Period Cutoff Preceding Disposition Action Content or Folder States
» Custom Triggers Global Triggers Custom Direct Triggers
» Creating or Editing a Trigger
» Viewing Trigger Information Viewing Trigger References Deleting a Trigger
» Setting Up Indirect Triggers Deleting an Indirect Trigger Date Entry
» Creating or Editing a Custom Time Period Viewing Period Information
» Viewing Period References Deleting a Custom Period
» Example: Creating a Custom Period
» Creating or Editing Custom Metadata Fields Viewing Custom Metadata Field Information
» About Custom Metadata Example: Creating a Custom Category Metadata Field
» Event Dispositions Time Dispositions
» About Dispositions Category Rule Review Using Workflows
» Preceding Actions Triggering Event Content State Triggering Event
» Classified Records Actions Dispose Actions
» Other Actions Disposition Actions
» Retention Periods Disposition Precedence
» Enabling or Disabling User-Friendly Captions Creating or Editing a Disposition Rule
» Copying a Disposition Rule Viewing Disposition Information Deleting a Disposition Rule
» Event Disposition Simple TimeEvent Disposition Time Disposition
» Architecture Oracle URM and the UCM Adapter
Show more