The IMetabasePolicy interface contains properties and methods used to set repository security policy.
Property name | Brief description | |
The ABACRules property returns structure of attribute-based access control. | ||
The AdmUserTitle property determines a string to display in the window header of a security manager for a specified administrator type. | ||
The AllowCreateUserGrant property enables creating two roles while maintaining the security policy: | ||
The AllowDeferredLoading property determines the attribute of the deferred loading of descriptors on connecting to the repository. | ||
The AllowedDocumentFormats property determines formats documents, that can be loaded and opened in repository. | ||
The AllowUserQueries property determines whether the development tools for data exporting from the platform warehouse will be available. | ||
The AlwaysPrintDocumentLabel property determines whether marking stamp will be displayed regardless the applied method of access control and settings of document marking on exporting or printing. | ||
The AttributeBasedAccessControl property determines whether attribute-based access control method is used to control access to objects. | ||
The AuditClipboardOperations property determines logging of operations of copying to clipboard. | ||
The AuditPolicy property returns an object that contains access policy to objects and events accounting under them. | ||
The AutoLockPeriod property determines user inactivity period in days, when it expires the user account is blocked. | ||
Outdated. Use IMetabasePolicy.CheckUserPassword. | ||
The AutoRun property returns an object opened while connecting to repository. | ||
The Certificates property returns collection of security certificates. | ||
The CheckUserPassword property determines whether authorization by platform means is used. | ||
The CopyToClipboardAllowed property determines whether it is possible to copy data into a clipboard and copy a screen. | ||
The CreateDeferredSubjects property determined whether users with deferred loading are created. | ||
The DiscretionaryAccessControl property determines whether it is possible to use discretionary access control. | ||
The EnforceApplicationRole property indicates whether it is possible to use application role in security policy. | ||
The ESKMode property determines whether it is possible to use compatibility mode to work with domain groups in Oracle DBMS. | ||
The FailedLogonsCounter_ResetPeriod property determines the period (in minutes) after which the counter of failed logons number reset. | ||
The ForceCleanMemory property determines whether to clean the memory and fill it with zeros. | ||
The IsaPresent property returns whether the mode of distributing roles between information security administrator and application administrator is activated. | ||
The LockIdentifiersPeriod property determines period during which it is forbidden to reuse certificates of deleted users. | ||
The LogonHoursPolicy property returns parameters of access to the platform for the specified security subject. | ||
The MandatoryAccess property returns an object that contains mandatory access of a security manager. | ||
The MandatoryAccessControl property determines a flag of using mandatory method of access distribution. | ||
The MaxFailedLogons property determines the number of failed logons, when it is exceeded, the user is blocked. | ||
The MethodsCombineAlgorithm property determines permission combination algorithm by attribute-based and discretionary access control method. | ||
The ObjectsAttributes property returns attributes of classes and specific types of objects. | ||
The ObjectsIdFormat property determines identifiers format for repository objects. | ||
|
|
|
The PasswordPolicy property returns an object that contains password policy. | ||
The PredefinedPrivilege property returns parameters of a specified privilege. Defining privileges is performed with enumeration. | ||
The PrintersPolicy property returns the security settings for printers. | ||
The Privilege property returns privilege parameters by the specified name. | ||
The PrivilegeCount property returns number of privileges available in a security manager. | ||
The PrivilegeName property returns element privilege by index. | ||
The ReportStamp property determines the stamp type used to mark documents. | ||
The RestrictAdminAccess property determines whether the users having the privilege as the application administrator (creating, deleting users), are able to open the repository objects. | ||
The RestrictGroupDeletion property determines whether the deletion of groups is allowed if the group has effective permissions for the repository objects. | ||
The RestrictIsaAccess property determines whether users who have a privilege as ISA (Change security mode and a list of access control of any object) have a possibility to open repository objects. | ||
The RestrictUserDeletion property determines whether application administrator is prohibited to delete users who has any access permissions on repository objects. | ||
The RootObject property determines the folder which will be the root on logging in the repository. | ||
The Security property returns parameters of a security manager. | ||
The StationsPolicy property returns a list of stations that enter current repository was prohibited. | ||
The SupportUserPrivateFolder property determines whether the mechanism of users' private folders is used. |
||
The UserPrivateFolderRoot property determines the root folder for users' private folders. |
Method name | Brief description | |
The IsObjectsIdFormatValid method checks the string on detecting incorrect data (the Russian language, the first character is number, and so on). If the string is correct, it can be used as identifiers format. | ||
The PromoteToIsaMode method activates a mode of distributing roles between information security administrator and application administrator. | ||
The RevertToStandardMode method disables the mode of distributing roles between information security administrator and application administrator. |
See also:
Metabase Assembly Interfaces | General Policy