Previous Page
|
Next Page
Previous Page
|
Next Page
SAS 9.2 Intelligence Platform: Security Administration Guide
Authorization Model
Overview of the Metadata Authorization Model
Use and Enforcement of Each Permission
Inheritance Paths
Permissions by Item
Permissions by Task
Authorization Decisions
Fine-Grained Controls for Data
Previous Page
|
Next Page
|
Top of Page
Copyright © 2011 by SAS Institute Inc., Cary, NC, USA. All rights reserved.
Previous Page
|
Next Page
|
Top of Page