Previous Page | Next Page

Authorization Model

Overview of the Metadata Authorization Model

About Metadata-Based Permissions

Granularity and Mechanics

Inheritance Paths and Identity Precedence


About Metadata-Based Permissions

SAS provides a metadata-based authorization layer that supplements protections from the host environment and other systems. Across authorization layers, protections are cumulative. In order to perform a task, a user must have sufficient access in all applicable layers.

CAUTION:
Some clients (such as SAS Data Integration Studio and SAS Enterprise Guide) enable power users to create and run SAS programs that access data directly, bypassing metadata layer controls.

It is important to manage physical layer access in addition to metadata layer controls. For example, use host operating system protections to limit access to any sensitive SAS data sets. See Host Access to SAS Tables.  [cautionend]

CAUTION:
Not all permissions are enforced for all items.

Enforcement of permissions other than ReadMetadata and WriteMetadata varies by item type and (for data) by the method with which a library is assigned. See Use and Enforcement of Each Permission.  [cautionend]


Granularity and Mechanics

You can set permissions at these levels of granularity:

See Also

Permissions on Folders

Permissions on Servers

Fine-Grained Controls for Data


Inheritance Paths and Identity Precedence

Permission settings are conveyed across two distinct relationship networks:

See Also

Inheritance Paths

Identity Precedence

Previous Page | Next Page | Top of Page