Managing Encyclopedia volume security : Using information object pass-through security
 
Using information object pass-through security
To connect to a data source, an information object uses a data connection definition (.dcd) file. The DCD specifies what security information, such as a user name and password, the information object uses to access data from the data source.
When creating a DCD, the data modeler uses Actuate Information Object Designer to specify the file’s security policy as either proxy or pass‑through.
*Using proxy security, the information object uses the security information specified in the DCD when it connects to a data source.
*Using pass-through security, the information object uses the security information provided by the volume administrator using Management Console.
Typically, you use pass-through security to avoid changing the name-value pairs set in the DCD by using Files and Folders in Management Console to specify alternate name-value pairs that override those in the DCD.
When associating pass-through security with an Encyclopedia volume security role, the role must have only individual users as members. iHub does not support using nested roles with pass-through security.