4.6 Virtual Private Model – Security

A Virtual Private Model (VPM) is an optional component that provides a highly flexible and comprehensive security layer. The VPM controls security for individual database tables. All queries, whether they are created manually or automatically generated from a data model, are filtered through the VPM.

The VPM is invisible to users, transparently providing access only to data for which a given user is authorized. Because the VPM is applied at the data level, security logic defined in the VPM applies to every method of data access (deployed report, ad hoc report, dashboard, Worksheet, etc.).

A VPM consists of conditions, hidden columns, lookups, and their associated triggers. Conditions and hidden columns allow you to filter rows and columns, respectively, and can be easily created for global application. Triggers provide fine-grained control on conditions and hidden columns by role, group, and even individual user. Multiple VPMs can be specified for a given data source, and these are joined in an 'and' fashion.

See Also

Design for Multi-Tenant Environment, in Integration, for connection-based access control.

<< 4.5.6 Accessing a Stored Procedure © 1996-2013 InetSoft Technology Corporation (v11.5) 4.6.1 Creating a VPM >>