Browse Prior Art Database

Implementing Role Based Security Using Data Entry Fields

IP.com Disclosure Number: IPCOM000028244D
Original Publication Date: 2004-May-05
Included in the Prior Art Database: 2004-May-05
Document File: 2 page(s) / 46K

Publishing Venue

IBM

Abstract

Forms are designed such that all the fields designated to a specific role are contained in a single form and fields designated to other roles are not contained in the given form . This requires the user in the role to be an expert on the on all the data entry fields contained on the form. It also requires that the form designer know of the specific roles as the forms are created. An optimal model is to provide forms based on the data content that needs to be collected regardless of the role. Thus, when the user in a role is performing the data entry, the user is able to see the data in context with that of the other roles and the form creator is not restricted by the roles.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 2

Implementing Role Based Security Using Data Entry Fields

The following discloses a process which allows individual data fields within a form to be secured against a dynamic role.

Forms are designed such that all the fields designated to a specific role are contained in a single form and fields designated to other roles are not contained in the given form . This requires the user in the role to be an expert on the on all the data entry fields contained on the form. It also requires that the form designer know of the specific roles as the forms are created. An optimal model is to provide forms based on the data content that needs to be collected regardless of the role. Thus, when the user in a role is performing the data entry, the user is able to see the data in context with that of the other roles and the form creator is not restricted by the roles.

Data management can be divided among several roles applied to the customer environment. Current implemtations often create an entire form based on a single role. With the disclosed process, form fields can controlled through a security model defined by a data creation/data entry tool.

Working through an example of a policy editor, the following roles and responsibilities might be defined in the customer environment:

Role 1: the IT professional who creates the basic policy structure Role 2: the business expert who uses the output of step 1 to create organization of the policies based on the business data and business rules Role 3 : the same or a second business expert who completes the policies by filling in the values assigned to the different policies and determining the time periods in which they should be applied.

Example Policy edited by Role 1 Example Policy edited by Role 2 Example Policy edited by Role 3

Defining security on individual policy fields can definition tool is implemented with built in authorized roles allowing the roles listed above to per...