FileNet P8 Platform, Version 5.2.1            

Constraint Mask

By default, all the rights are checked, meaning all constraints are masked and only those that have the Use Marked Objects access rights on the marking will be able to view and access the object.

When one of the rights in the constraint mask is cleared, it indicates that users with this privilege on that object are allowed through the marking restriction even if they do not have the Use Marked Objects access right on the marking. In this way, the constraint mask can be used to design more granular control at the marking level.

Here are some examples to illustrate the security behavior of the constraint mask:

In the following graphic:

Effect of constraint mark on object access



Last updated: March 2016
p8psa062.htm

© Copyright IBM Corporation 2017.