View Printable Version

Tc Security

Session Number: 651
Connection/Track: Roundtable
Session Type: Roundtable
Primary Presenter: Round Table [Moderator]
Room(s)/
Time(s):

Amazon HI => Thu, May 10, 2012 (03:25 PM - 05:25 PM)

Presentation Level: All of the above
Connection: None
Length: 130
User Role: End User of Siemens PLM Products at Company I work for (Not Siemens PLM)
Industry Presentation is Most Applicable Towards: Other
Primary Presenter Biography: Analyst Rep
Siemens Rep - Mike Coleman, Bob Donovan & Bobby Florence
User Rep - Moderator, Mary Hoover, Boeing

Abstract:  Managing data access using Access Manager. Use cases for Attribute Level Security

What challenges have you had setting up the Access Manager rule tree to meet your requirements?  
What best practices have you developed for Access Manager at your company?
Do you have requirements that you have difficult meeting that you believe will be solved by attribute level security?
What are your expectations of attribute level security functionality?
Running multiple locations out of one database can lead to site specific branches in your rule tree to meet unique requirements; what have you done to standardize unique site ACL branches in the rule tree?

FacebookTwitter

    If you have questions during non-business hours please feel free to contact Kati Kenyon at kkenyon@plmworld.org with any conference questions or concerns.