SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Fishbowl SolutionslinkSecurityAchieving Pro/INTRALINK 3.x Folder Access Control under Windchill 9.x
Fishbowl Solutions Mission: Deliver best in class solutions  & services that exceed our  customers expectations.  ,[object Object]
 Gold Level Software Member of PTC Partner Advantage
 Customer Focused & Guaranteed Results!
 World-Class Customers – References Available,[object Object]
You’ll See… The access Control difference between Intralink 3.4 & Windchill How to reproduce Intralink 3.4 access control out-of-the-box in Windchill (hint: lots of clicks, headaches & indigestion) How Fishbowl Solutions’ linkSecurityautomates the access control administration process so you can stop popping the antacids.
 So, #1… What’s The  Difference  between  Access Control  In Intralink 3.4  and  Windchill?
Intralink 3.4 has a “rigid” access control structure implemented within a single interface
Windchill has “flexible” access control configured in multiple interfaces & used in a variety of ways
Windchill Access Control Challenges Objects do not simply inherit folder permissions in the expected manner Team roles apply to the entire context.  This yields large numbers of Products and admin overhead in order to maintain the access control granularity desired by many companies. Ad Hoc policies have unexpected behaviors – they remain in effect after an object is promoted.  Visibility is challenging - making them difficult to remove when done. Configuration is complicated due to multiple interfaces. The administrator must decide how the components work together.
Components of Windchill Access Control Windchill Domains A Product/Library has a single “Default” domain OOTB The domain contains the access control rules Domains can be assigned to one or more specific folders Domains inherit access control rules of parent domains
Out-of-the-box Domain Hierarchy
Components of Windchill Access Control Access Control Rules Each rule applies to a hierarchical object type Each rule can be applied to either a specific lifecycle state or across all lifecycles Each rule applies to a user, group, organization, or role Each rule contains permissions that either allow or deny operations such as Read, Create, Modify, Revise, etc…
Rule Creation using the Policy Administrator Tool
Components of Windchill Access Control Team Page Each Product/Library has a team page where users and groups are assigned to one or more roles The roles may be global or local to the specific Product/Library Note:  Shared teams may be leveraged if  you have common teams that apply  across multiple Products or Libraries
Components of Windchill Access Control Folder Properties Allows a folder to be assigned to a non-Default domain The preference: Security; Default Folder Domains; must be enabled to make this functionality available.
Ok. #2. By now you’re probably asking yourself… “So how do I regain my Intralink 3.4 folder access control using these components?”
Hierarchical structure must be mimicked to supply expected rights inheritance. Example: an individual who has rights to modify in the Interior folder would expect rights to modify in Dashboard folder as well. If Dashboard domain was not a child of Interior this would not happen.
Rules Teams Domains Folders
Isn’t There An Easier Way? Challenges with manually assigned Folder Access Control ,[object Object]
Complexity - The Policy Administrator tool can be complex for casual users to learn.  Product and Library Managers need to be familiar it to be effective
Risks - There is nothing to help validate that all roles, folders, and access control rules are correctly configured – it is simply incumbent on the administrator to do it right.,[object Object]
Fishbowl Solutions linkSecurity Folder Access Control  Implemented within a single simplified user interface  Never go into the Policy Administrator tool.

Weitere ähnliche Inhalte

Ähnlich wie Fishbowl Solutions LinkSecurity for Windchill 9.x

Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Jayesh Naik
 
Application hardening
Application hardeningApplication hardening
Application hardeningJayesh Naik
 
Building products people actually can use – why all developers need to unders...
Building products people actually can use – why all developers need to unders...Building products people actually can use – why all developers need to unders...
Building products people actually can use – why all developers need to unders...Cyber-Duck
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesAdi Gazit Blecher
 
Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...ScriptLogic
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!Dayalan Punniyamoorthy
 
Fluent Ribbon Control Suite Walkthrough
Fluent Ribbon Control Suite WalkthroughFluent Ribbon Control Suite Walkthrough
Fluent Ribbon Control Suite WalkthroughDaniel Degtyarev
 
Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointBeyondTrust
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklistbackdoor
 
Kill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin RightsKill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin RightsScriptLogic
 
Ubiquity final design_wireframes
Ubiquity final design_wireframesUbiquity final design_wireframes
Ubiquity final design_wireframesJSLKent
 
6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solutionNikec Solutions
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...AntonioMaio2
 
Version Uncontrolled - How to Manage Your Version Control (whitepaper)
Version Uncontrolled - How to Manage Your Version Control (whitepaper)Version Uncontrolled - How to Manage Your Version Control (whitepaper)
Version Uncontrolled - How to Manage Your Version Control (whitepaper)Revelation Technologies
 
6 Elements_Permissions.pdf
6 Elements_Permissions.pdf6 Elements_Permissions.pdf
6 Elements_Permissions.pdfJeff Smith
 
Customising Oracle's eBusiness Suite
Customising Oracle's eBusiness SuiteCustomising Oracle's eBusiness Suite
Customising Oracle's eBusiness Suitedrdavidtaylor
 

Ähnlich wie Fishbowl Solutions LinkSecurity for Windchill 9.x (20)

Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
 
Application hardening
Application hardeningApplication hardening
Application hardening
 
Building products people actually can use – why all developers need to unders...
Building products people actually can use – why all developers need to unders...Building products people actually can use – why all developers need to unders...
Building products people actually can use – why all developers need to unders...
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
 
oracle
oracleoracle
oracle
 
Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!
 
Fluent Ribbon Control Suite Walkthrough
Fluent Ribbon Control Suite WalkthroughFluent Ribbon Control Suite Walkthrough
Fluent Ribbon Control Suite Walkthrough
 
Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the Endpoint
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
Domain wide organisation policy
Domain wide organisation policyDomain wide organisation policy
Domain wide organisation policy
 
Why TOMOYO Linux?
Why TOMOYO Linux?Why TOMOYO Linux?
Why TOMOYO Linux?
 
Kill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin RightsKill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin Rights
 
Ubiquity final design_wireframes
Ubiquity final design_wireframesUbiquity final design_wireframes
Ubiquity final design_wireframes
 
Em13c New Features- Two of Two
Em13c New Features- Two of TwoEm13c New Features- Two of Two
Em13c New Features- Two of Two
 
6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
 
Version Uncontrolled - How to Manage Your Version Control (whitepaper)
Version Uncontrolled - How to Manage Your Version Control (whitepaper)Version Uncontrolled - How to Manage Your Version Control (whitepaper)
Version Uncontrolled - How to Manage Your Version Control (whitepaper)
 
6 Elements_Permissions.pdf
6 Elements_Permissions.pdf6 Elements_Permissions.pdf
6 Elements_Permissions.pdf
 
Customising Oracle's eBusiness Suite
Customising Oracle's eBusiness SuiteCustomising Oracle's eBusiness Suite
Customising Oracle's eBusiness Suite
 

Mehr von Billy Cripe

The Rise of the Free Agent Workforce
The Rise of the Free Agent WorkforceThe Rise of the Free Agent Workforce
The Rise of the Free Agent WorkforceBilly Cripe
 
Telling Your Story To A Disrupting Marketplace
Telling Your Story To A Disrupting MarketplaceTelling Your Story To A Disrupting Marketplace
Telling Your Story To A Disrupting MarketplaceBilly Cripe
 
Exchange Litigation Readiness with Digitiliti
Exchange Litigation Readiness with DigitilitiExchange Litigation Readiness with Digitiliti
Exchange Litigation Readiness with DigitilitiBilly Cripe
 
Christiania Parent Circle - Understanding How Kids Communicate social media
Christiania Parent Circle - Understanding How Kids Communicate social mediaChristiania Parent Circle - Understanding How Kids Communicate social media
Christiania Parent Circle - Understanding How Kids Communicate social mediaBilly Cripe
 
Can Your Desktop Backup Do This?
Can Your Desktop Backup Do This?Can Your Desktop Backup Do This?
Can Your Desktop Backup Do This?Billy Cripe
 
QR Codes: Hyperlinks for Meatspace
QR Codes: Hyperlinks for MeatspaceQR Codes: Hyperlinks for Meatspace
QR Codes: Hyperlinks for MeatspaceBilly Cripe
 
2 Types of Collaboration
2 Types of Collaboration2 Types of Collaboration
2 Types of CollaborationBilly Cripe
 
BloomThink - The Social Media Shift - Tech Talk
BloomThink - The Social Media Shift - Tech TalkBloomThink - The Social Media Shift - Tech Talk
BloomThink - The Social Media Shift - Tech TalkBilly Cripe
 
Even More Story Starters
Even More Story StartersEven More Story Starters
Even More Story StartersBilly Cripe
 
More Story Starters
More Story StartersMore Story Starters
More Story StartersBilly Cripe
 
Wish You Were Here! Social Consumer Engagement in the Cruise Industry
Wish You Were Here!  Social Consumer Engagement in the Cruise IndustryWish You Were Here!  Social Consumer Engagement in the Cruise Industry
Wish You Were Here! Social Consumer Engagement in the Cruise IndustryBilly Cripe
 
Should I Go Mobile? Am I Cool Enough?
Should I Go Mobile?  Am I Cool Enough?Should I Go Mobile?  Am I Cool Enough?
Should I Go Mobile? Am I Cool Enough?Billy Cripe
 
A Maven's Guide To ECM Best Practices
A Maven's Guide To ECM Best PracticesA Maven's Guide To ECM Best Practices
A Maven's Guide To ECM Best PracticesBilly Cripe
 
Mobility in the Enterprise
Mobility in the EnterpriseMobility in the Enterprise
Mobility in the EnterpriseBilly Cripe
 
Digital Archiving with Fishbowl Solutions
Digital Archiving with Fishbowl SolutionsDigital Archiving with Fishbowl Solutions
Digital Archiving with Fishbowl SolutionsBilly Cripe
 
Fishbowl Solutions' Oracle ECM 11g Upgrade, Migration & Solutions
Fishbowl Solutions' Oracle ECM 11g Upgrade,  Migration & SolutionsFishbowl Solutions' Oracle ECM 11g Upgrade,  Migration & Solutions
Fishbowl Solutions' Oracle ECM 11g Upgrade, Migration & SolutionsBilly Cripe
 
Information architecture for men in kilts slideshare
Information architecture for men in kilts slideshareInformation architecture for men in kilts slideshare
Information architecture for men in kilts slideshareBilly Cripe
 
If e20 is the shiznit why are we still using email slide share
If e20 is the shiznit why are we still using email slide shareIf e20 is the shiznit why are we still using email slide share
If e20 is the shiznit why are we still using email slide shareBilly Cripe
 
Collaborate2010 buzz fishbowl_solutions
Collaborate2010 buzz fishbowl_solutionsCollaborate2010 buzz fishbowl_solutions
Collaborate2010 buzz fishbowl_solutionsBilly Cripe
 

Mehr von Billy Cripe (20)

The Rise of the Free Agent Workforce
The Rise of the Free Agent WorkforceThe Rise of the Free Agent Workforce
The Rise of the Free Agent Workforce
 
Telling Your Story To A Disrupting Marketplace
Telling Your Story To A Disrupting MarketplaceTelling Your Story To A Disrupting Marketplace
Telling Your Story To A Disrupting Marketplace
 
Exchange Litigation Readiness with Digitiliti
Exchange Litigation Readiness with DigitilitiExchange Litigation Readiness with Digitiliti
Exchange Litigation Readiness with Digitiliti
 
Christiania Parent Circle - Understanding How Kids Communicate social media
Christiania Parent Circle - Understanding How Kids Communicate social mediaChristiania Parent Circle - Understanding How Kids Communicate social media
Christiania Parent Circle - Understanding How Kids Communicate social media
 
Can Your Desktop Backup Do This?
Can Your Desktop Backup Do This?Can Your Desktop Backup Do This?
Can Your Desktop Backup Do This?
 
QR Codes: Hyperlinks for Meatspace
QR Codes: Hyperlinks for MeatspaceQR Codes: Hyperlinks for Meatspace
QR Codes: Hyperlinks for Meatspace
 
2 Types of Collaboration
2 Types of Collaboration2 Types of Collaboration
2 Types of Collaboration
 
BloomThink - The Social Media Shift - Tech Talk
BloomThink - The Social Media Shift - Tech TalkBloomThink - The Social Media Shift - Tech Talk
BloomThink - The Social Media Shift - Tech Talk
 
Even More Story Starters
Even More Story StartersEven More Story Starters
Even More Story Starters
 
More Story Starters
More Story StartersMore Story Starters
More Story Starters
 
Wish You Were Here! Social Consumer Engagement in the Cruise Industry
Wish You Were Here!  Social Consumer Engagement in the Cruise IndustryWish You Were Here!  Social Consumer Engagement in the Cruise Industry
Wish You Were Here! Social Consumer Engagement in the Cruise Industry
 
Should I Go Mobile? Am I Cool Enough?
Should I Go Mobile?  Am I Cool Enough?Should I Go Mobile?  Am I Cool Enough?
Should I Go Mobile? Am I Cool Enough?
 
A Maven's Guide To ECM Best Practices
A Maven's Guide To ECM Best PracticesA Maven's Guide To ECM Best Practices
A Maven's Guide To ECM Best Practices
 
Mobility in the Enterprise
Mobility in the EnterpriseMobility in the Enterprise
Mobility in the Enterprise
 
Digital Archiving with Fishbowl Solutions
Digital Archiving with Fishbowl SolutionsDigital Archiving with Fishbowl Solutions
Digital Archiving with Fishbowl Solutions
 
Fishbowl Solutions' Oracle ECM 11g Upgrade, Migration & Solutions
Fishbowl Solutions' Oracle ECM 11g Upgrade,  Migration & SolutionsFishbowl Solutions' Oracle ECM 11g Upgrade,  Migration & Solutions
Fishbowl Solutions' Oracle ECM 11g Upgrade, Migration & Solutions
 
Story Starters
Story StartersStory Starters
Story Starters
 
Information architecture for men in kilts slideshare
Information architecture for men in kilts slideshareInformation architecture for men in kilts slideshare
Information architecture for men in kilts slideshare
 
If e20 is the shiznit why are we still using email slide share
If e20 is the shiznit why are we still using email slide shareIf e20 is the shiznit why are we still using email slide share
If e20 is the shiznit why are we still using email slide share
 
Collaborate2010 buzz fishbowl_solutions
Collaborate2010 buzz fishbowl_solutionsCollaborate2010 buzz fishbowl_solutions
Collaborate2010 buzz fishbowl_solutions
 

Kürzlich hochgeladen

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Kürzlich hochgeladen (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Fishbowl Solutions LinkSecurity for Windchill 9.x

  • 1. Fishbowl SolutionslinkSecurityAchieving Pro/INTRALINK 3.x Folder Access Control under Windchill 9.x
  • 2.
  • 3. Gold Level Software Member of PTC Partner Advantage
  • 4. Customer Focused & Guaranteed Results!
  • 5.
  • 6. You’ll See… The access Control difference between Intralink 3.4 & Windchill How to reproduce Intralink 3.4 access control out-of-the-box in Windchill (hint: lots of clicks, headaches & indigestion) How Fishbowl Solutions’ linkSecurityautomates the access control administration process so you can stop popping the antacids.
  • 7. So, #1… What’s The Difference between Access Control In Intralink 3.4 and Windchill?
  • 8. Intralink 3.4 has a “rigid” access control structure implemented within a single interface
  • 9. Windchill has “flexible” access control configured in multiple interfaces & used in a variety of ways
  • 10. Windchill Access Control Challenges Objects do not simply inherit folder permissions in the expected manner Team roles apply to the entire context. This yields large numbers of Products and admin overhead in order to maintain the access control granularity desired by many companies. Ad Hoc policies have unexpected behaviors – they remain in effect after an object is promoted. Visibility is challenging - making them difficult to remove when done. Configuration is complicated due to multiple interfaces. The administrator must decide how the components work together.
  • 11. Components of Windchill Access Control Windchill Domains A Product/Library has a single “Default” domain OOTB The domain contains the access control rules Domains can be assigned to one or more specific folders Domains inherit access control rules of parent domains
  • 13. Components of Windchill Access Control Access Control Rules Each rule applies to a hierarchical object type Each rule can be applied to either a specific lifecycle state or across all lifecycles Each rule applies to a user, group, organization, or role Each rule contains permissions that either allow or deny operations such as Read, Create, Modify, Revise, etc…
  • 14. Rule Creation using the Policy Administrator Tool
  • 15. Components of Windchill Access Control Team Page Each Product/Library has a team page where users and groups are assigned to one or more roles The roles may be global or local to the specific Product/Library Note: Shared teams may be leveraged if you have common teams that apply across multiple Products or Libraries
  • 16. Components of Windchill Access Control Folder Properties Allows a folder to be assigned to a non-Default domain The preference: Security; Default Folder Domains; must be enabled to make this functionality available.
  • 17. Ok. #2. By now you’re probably asking yourself… “So how do I regain my Intralink 3.4 folder access control using these components?”
  • 18.
  • 19. Hierarchical structure must be mimicked to supply expected rights inheritance. Example: an individual who has rights to modify in the Interior folder would expect rights to modify in Dashboard folder as well. If Dashboard domain was not a child of Interior this would not happen.
  • 20.
  • 21.
  • 23.
  • 24. Complexity - The Policy Administrator tool can be complex for casual users to learn. Product and Library Managers need to be familiar it to be effective
  • 25.
  • 26. Fishbowl Solutions linkSecurity Folder Access Control Implemented within a single simplified user interface Never go into the Policy Administrator tool.
  • 27.
  • 29. linkSecurityautomates folder assignment and access control rule creation based on configurable rule sets.
  • 31. The familiar Team tool is still utilized to assign users and groups to folders. You get the benefit of automation without the learning curve.Features & Value Quality LinkSecurity insures that domains, teams, folders, and access control rules are correctly configured. Compatibility LinkSecurity automates the removal of domains and teams when folder access control is no longer desired on a particular folder.
  • 32. linkSecurityConclusions linkSecurityprovides a simplified user interface that allows a company to regain the folder access control that they were accustomed to in Intralink 3.4 linkSecurityhas been used to automate configuring folder access control on as many as 1,200 folders on a single system - with no performance degradation (validated using Fishbowl Solutions LinkTuner product.)
  • 33. Schedule a Demonstration with Us! mcadsales@fishbowlsolutions.com Fishbowl Solutions, Inc. www.fishbowlsolutions.com © 2010 Fishbowl Solutions 3601 Park Center Blvd, Suite 106 Minneapolis, MN 55416 TEL (952) 465-3400 • FAX (952) 465-3401