Task 4: Enforcing security on decision services
In this task you enforce security on decision services to give access to users based on their groups.
About this task
In the previous tasks, you created an LDAP environment, modified the security realm of the application server, and imported groups and users into the Decision Center database.
- Establishing a permission profile for each group (Full Authoring, Read Only, and so on).
- Enforce security on a decision service and specify which groups of users have access.
Step 1: Setting the permission profiles
In this step, you set the permission profiles by group.
Procedure
- Full Authoring
- Groups assigned this permission profile can view, create, update, and delete all content.
- Read Only
- Groups assigned this permission profile can view the content but cannot create, update, or delete any artifacts.
- None
- Groups assigned this permission cannot view any content. This setting is seldom used.
- Custom
- Groups assigned custom permissions. This subject is not covered in this tutorial.
- The Read Only profile to the Checkers group.
- The Full Authoring profile to the Scoring group
Step 2: Enforcing security on a simple decision service
In this step, you enforce security on two simple decision services and give access to different groups.
About this task
Procedure
Step 3: Enforcing security on a multilayered decision service
In this step, you make the BOM project, called Loan Validation Base, visible to the Scoring group only.
Procedure
A decision service can also be organized into several rule projects to allow for complex decisions to be grouped as one entity. For example, Loan Validation Service is organized as follows:

- First, enforce security for the entire decision service, and give access to all the groups to work on the decision service.
- Then, restrict the BOM project to your chosen group.
Notice also, as you go through the steps, the presence of subbranches, called Initial Release and Spring Release. These branches were created for another tutorial on the decision governance framework, which is beyond the scope of this tutorial (see Change management). All branches originate from the main branch of the decision service. Consequently, when you enforce security on the main branch, security is inherited by all its subbranches, unless you specify otherwise. In other words, when you restrict access to Loan Validation Base, this restriction also applies in all subbranches.
Results
- Stop the ApacheDS server (on Windows, close the window).
- Return the sample server to its initial state to ensure the proper running of other samples and tutorials. See Restoring the sample server.







