Securing the Decision Center
The objective of this chapter is to describe the Decision Center security configuration. It provides information about the user management to access Decision Center (authentication) and artifact permissions (authorization) within Decision Center.
We first describe the role of the three components involved in Decision Center security:
•Predefined Decision Center UI roles
•The Decision Center groups
•The decision governance framework
We then suggest three sample permission patterns. For each pattern, we outline the ...