Previous Page
|
Next Page
Authorization Model
Authorization Overview
Three Levels of Granularity
Two Relationship Networks
Object Inheritance
Permissions by Object Type
Permissions by Task
Types of Access Controls
Authorization Decisions
Fine-Grained Controls for Data
Use and Enforcement of Each Permission
Copyright © SAS Institute Inc. All rights reserved.
Previous Page
|
Next Page
|
Top of Page