Using information object pass-through security
To connect to a data source, an information object uses a data connection definition (.dcd) file. The DCD specifies what security information, such as a user name and password, the information object uses to access data from the data source.
When creating a DCD, the data modeler uses Actuate Information Object Designer to specify the file’s security policy as either proxy or pass‑through.

Using proxy security, the information object uses the security information specified in the DCD when it connects to a data source.

Using pass-through security, the information object uses the security information provided by the volume administrator using Management Console.
Typically, you use pass-through security to avoid changing the name-value pairs set in the DCD by using Files and Folders in Management Console to specify alternate name-value pairs that override those in the DCD.
When associating pass-through security with an Encyclopedia volume security role, the role must have only individual users as members. iHub does not support using nested roles with pass-through security.