IBM Security Role and Policy Modeler, Version 1.1.0.2

Importing schema

A schema is a set of rules that governs the way that data can be stored in the database. The schema defines the type of entries permitted, their attribute structure, and the syntax of the attributes.

#Encoding Set, UTF-8

IBM® Security Role and Policy Modeler supports a wide variety of language characters through the UTF-8 (UCS Transformation Format) character set. The encoding character set specified in the CSV file reads data that is represented in different locales. The data is based on the language and code page environment. For example, if some data is based on the French locale in the CSV file, then an appropriate encoding character set represents the French locale. This data is specified in the CSV file.

#Encoding Set

UTF-8

#Define Attribute

The IBM Security Role and Policy Modeler import schema contains this information:
Table 1. Schema types
Schema Type Maximum length in characters Description
Attribute UID 240 A unique attribute identifier.
Attribute Display Name 240 A name that you want to show on the IBM Security Role and Policy Modeler user interface.
Attribute Description 1024 A description of an attribute.
Type 240 Information about the attribute value. An attribute type value can be string, integer, identity, or hierarchical.
Usage 240 Information about the attribute usage. You can show the attributes on the user interface or use them for mining purposes to model roles. An attribute can have multiple values for the type. The possible values are:
  • UserDisplay: Set this value to show the identity attributes. The format is UserDisplay1, UserDisplay2, UserDisplay3, UserDisplay4, UserDisplay5.
  • PermissionDisplay: Set this value to show the permission attributes. The format is PermissionDisplay1, PermissionDisplay2, PermissionDisplay3, PermissionDisplay4, PermissionDisplay5.
  • UserAnalysis: Set this value to analyze the identity attributes.
  • PermissionAnalysis: Set this value to analyze the permission attributes.
  • RoleAnalysis: Set this value to analyze the role attributes.
  • SodAnalysis: Set this value to analyze the separation of duty constraint attributes.

#Define Source

This information represents all sources for the data; for example, identities, users, permissions, roles, policies, separation of duty constraints, and attachments. The CSV file contains all the source information that you can import into the IBM Security Role and Policy Modeler.
Source UID Source Name Source Description
source://source1 Source Name 1 Source Description 1
source://source2 Source Name 2 Source Description 2
source://source3 Source Name 3 Source Description 3

#Define Role Type

This information represents the role classification type. These role types include the default types in addition to the custom types. The CSV file contains all the role type information that you can import into the IBM Security Role and Policy Modeler.

#Define Role Type

Role Type

Application role

Business role

IT

The default role types that are preloaded with IBM Security Role and Policy Modeler are Application role and Business role.

The existing default role types are overridden when:



Feedback