Loading...
Please wait, while we are loading the content...
Similar Documents
Getting Started with Designing and Implementing a SAS ® 9 . 4 Metadata and File System Security Design
| Content Provider | Semantic Scholar |
|---|---|
| Author | Hedberg, A. Hopkins, Philip F. |
| Copyright Year | 2017 |
| Abstract | SAS® has been installed at your organization – now what? How do you approach configuring groups, roles, folders, and permissions in your environment? This presentation is built on best practices used within the U.S. SAS® Consulting division and aims to equip new and seasoned SAS administrators with the knowledge and tools necessary to design and implement a SAS metadata and file system security model. We start by covering the basic building blocks of the SAS® Intelligence Platform authorization framework. We discuss the SAS® Metadata authorization facility, and highlight the differences between groups and roles, permissions and capabilities, access control entries and access control templates, and what content can be stored within metadata folders versus in file system folders. We review the various authorization layers in a SAS deployment that must work together to create a secure environment, including the metadata layer, the file system, and the data layer. We highlight key design best practices for securing metadata and the file system. Then, we present a 10-step best practice approach for how to design your SAS metadata security model. We provide an introduction to basic metadata and file system security design templates that have been used extensively by SAS Consulting in helping customers secure their SAS environments. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://support.sas.com/resources/papers/proceedings17/SAS0709-2017.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |