Contents Implementation & Administration Guide 1.1 Previous Next

Security Concepts and Policies

The installation process for the SAS Information Delivery Portal creates a security structure in your enterprise directory that controls access on both the Web server (middle tier) and the SAS server (back tier). The structure includes a default set of permissions that enable the portal to operate on a demonstration basis. This structure provides a starting point that you can build upon as needed to meet your organization's specific security requirements.

Web Server (Middle Tier) Security

The security structure for the Web server (middle tier) controls access to system components that reside within the portal application, including:

The security structure for the middle tier includes the following levels of access:

Back Tier (SAS Server) Security

The security structure for the SAS server (back tier) controls access to SAS system components including SAS tables, reports (stored processes), multidimensional databases (MDDBs), and archived packages. SAS Login definitions on the enterprise directory are the primary mechanism for controlling access to these objects. Each SAS server that you define to the portal must have a login definition that specifies which users or groups of users can access SAS objects on the server. If no users or groups are specified in the login definition, no users will be able to access these SAS objects.

The security structure for the back tier includes the following levels of access:

Implementing Security for Your Environment

Each implementation of the SAS Information Delivery Portal will have different security requirements. In determining how to implement portal security, you should consider your organization's internal security policies, the security mechanisms that are in place in your environment, the types of users who will need to access the portal, and the type of content that will be made available. Then you can modify the default portal security structure to meet your requirements

Contents Implementation & Administration Guide 1.1 Previous Next