Pre- and post-filtering of search results

There are two distinct approaches to filtering documents to ensure that search results contain only the documents that the user who submitted the search request is authorized to view.

Support for enforcing access controls relies on a combination of these two approaches. The design provides optimum performance while maintaining the precise security policies of the originating document repositories. By storing high-level access control data in the index, the system can provide an interim (potentially smaller) result set which can then be post-filtered to verify current access controls. The assumption is that if the user has access to the repository that owns the document, then chances are that the user also has access to the document.

The access control data that is stored in the index varies with the crawler type. For example, the Notes crawler can store database- and server-level access controls, and the Quickr for Domino crawler can store access controls for servers, places, and rooms.

All crawlers and data source types support the ability to index source access control data during crawl time. Some crawlers and data source types also support the ability to post-filter the result set and verify the user's current credentials. This type of support is provided through data source security mechanisms or the identity management component.

This two-pronged security design encompasses the following tasks:

Exporting documents

Post-filtering of search results is not supported by the export function. If you export documents after searching a secure collection, documents that are excluded from the search results through post-filtering will be included in the set of documents that are exported. Documents that are excluded from the search results through pre-filtering will not be exported.