Previous Page | Next Page

Security Features

Permissions Overview

SAS provides a metadata-based authorization layer that supplements protections from the host environment and other systems. Across authorization layers, protections are cumulative. In order to perform a task, a user must have sufficient access in all applicable layers.

You can use the metadata authorization layer to manage access to the following resources:

CAUTION:
Some clients (such as SAS Data Integration Studio and SAS Enterprise Guide) enable power users to create and run SAS programs that access data directly, bypassing metadata-layer controls.

It is important to manage physical layer access in addition to metadata-layer controls. For example, use host operating system protections to limit access to any sensitive SAS data sets. See Host Access to SAS Tables.  [cautionend]

CAUTION:
Not all permissions are enforced for all items.

Enforcement of permissions other than ReadMetadata and WriteMetadata varies by item type and (for data) by the method with which a library is assigned.   [cautionend]

See Also

Open Up Access

Getting Started With Permissions

Authorization Model

Previous Page | Next Page | Top of Page