SlideShare una empresa de Scribd logo
1 de 26
Fishbowl SolutionslinkSecurityAchieving Pro/INTRALINK 3.x Folder Access Control under Windchill 9.x
Fishbowl Solutions Mission: Deliver best in class solutions  & services that exceed our  customers expectations.  ,[object Object]
 Gold Level Software Member of PTC Partner Advantage
 Customer Focused & Guaranteed Results!
 World-Class Customers – References Available,[object Object]
You’ll See… The access Control difference between Intralink 3.4 & Windchill How to reproduce Intralink 3.4 access control out-of-the-box in Windchill (hint: lots of clicks, headaches & indigestion) How Fishbowl Solutions’ linkSecurityautomates the access control administration process so you can stop popping the antacids.
 So, #1… What’s The  Difference  between  Access Control  In Intralink 3.4  and  Windchill?
Intralink 3.4 has a “rigid” access control structure implemented within a single interface
Windchill has “flexible” access control configured in multiple interfaces & used in a variety of ways
Windchill Access Control Challenges Objects do not simply inherit folder permissions in the expected manner Team roles apply to the entire context.  This yields large numbers of Products and admin overhead in order to maintain the access control granularity desired by many companies. Ad Hoc policies have unexpected behaviors – they remain in effect after an object is promoted.  Visibility is challenging - making them difficult to remove when done. Configuration is complicated due to multiple interfaces. The administrator must decide how the components work together.
Components of Windchill Access Control Windchill Domains A Product/Library has a single “Default” domain OOTB The domain contains the access control rules Domains can be assigned to one or more specific folders Domains inherit access control rules of parent domains
Out-of-the-box Domain Hierarchy
Components of Windchill Access Control Access Control Rules Each rule applies to a hierarchical object type Each rule can be applied to either a specific lifecycle state or across all lifecycles Each rule applies to a user, group, organization, or role Each rule contains permissions that either allow or deny operations such as Read, Create, Modify, Revise, etc…
Rule Creation using the Policy Administrator Tool
Components of Windchill Access Control Team Page Each Product/Library has a team page where users and groups are assigned to one or more roles The roles may be global or local to the specific Product/Library Note:  Shared teams may be leveraged if  you have common teams that apply  across multiple Products or Libraries
Components of Windchill Access Control Folder Properties Allows a folder to be assigned to a non-Default domain The preference: Security; Default Folder Domains; must be enabled to make this functionality available.
Ok. #2. By now you’re probably asking yourself… “So how do I regain my Intralink 3.4 folder access control using these components?”
Hierarchical structure must be mimicked to supply expected rights inheritance. Example: an individual who has rights to modify in the Interior folder would expect rights to modify in Dashboard folder as well. If Dashboard domain was not a child of Interior this would not happen.
Rules Teams Domains Folders
Isn’t There An Easier Way? Challenges with manually assigned Folder Access Control ,[object Object]
Complexity - The Policy Administrator tool can be complex for casual users to learn.  Product and Library Managers need to be familiar it to be effective
Risks - There is nothing to help validate that all roles, folders, and access control rules are correctly configured – it is simply incumbent on the administrator to do it right.,[object Object]
Fishbowl Solutions linkSecurity Folder Access Control  Implemented within a single simplified user interface  Never go into the Policy Administrator tool.

Más contenido relacionado

Similar a Fishbowl Solutions LinkSecurity for Windchill 9.x

Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Jayesh Naik
 
Application hardening
Application hardeningApplication hardening
Application hardeningJayesh Naik
 
Building products people actually can use – why all developers need to unders...
Building products people actually can use – why all developers need to unders...Building products people actually can use – why all developers need to unders...
Building products people actually can use – why all developers need to unders...Cyber-Duck
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesAdi Gazit Blecher
 
Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...ScriptLogic
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!Dayalan Punniyamoorthy
 
Fluent Ribbon Control Suite Walkthrough
Fluent Ribbon Control Suite WalkthroughFluent Ribbon Control Suite Walkthrough
Fluent Ribbon Control Suite WalkthroughDaniel Degtyarev
 
Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointBeyondTrust
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklistbackdoor
 
Kill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin RightsKill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin RightsScriptLogic
 
Ubiquity final design_wireframes
Ubiquity final design_wireframesUbiquity final design_wireframes
Ubiquity final design_wireframesJSLKent
 
6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solutionNikec Solutions
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...AntonioMaio2
 
Version Uncontrolled - How to Manage Your Version Control (whitepaper)
Version Uncontrolled - How to Manage Your Version Control (whitepaper)Version Uncontrolled - How to Manage Your Version Control (whitepaper)
Version Uncontrolled - How to Manage Your Version Control (whitepaper)Revelation Technologies
 
6 Elements_Permissions.pdf
6 Elements_Permissions.pdf6 Elements_Permissions.pdf
6 Elements_Permissions.pdfJeff Smith
 
Customising Oracle's eBusiness Suite
Customising Oracle's eBusiness SuiteCustomising Oracle's eBusiness Suite
Customising Oracle's eBusiness Suitedrdavidtaylor
 

Similar a Fishbowl Solutions LinkSecurity for Windchill 9.x (20)

Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
 
Application hardening
Application hardeningApplication hardening
Application hardening
 
Building products people actually can use – why all developers need to unders...
Building products people actually can use – why all developers need to unders...Building products people actually can use – why all developers need to unders...
Building products people actually can use – why all developers need to unders...
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
 
oracle
oracleoracle
oracle
 
Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!
 
Fluent Ribbon Control Suite Walkthrough
Fluent Ribbon Control Suite WalkthroughFluent Ribbon Control Suite Walkthrough
Fluent Ribbon Control Suite Walkthrough
 
Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the Endpoint
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
Domain wide organisation policy
Domain wide organisation policyDomain wide organisation policy
Domain wide organisation policy
 
Why TOMOYO Linux?
Why TOMOYO Linux?Why TOMOYO Linux?
Why TOMOYO Linux?
 
Kill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin RightsKill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin Rights
 
Ubiquity final design_wireframes
Ubiquity final design_wireframesUbiquity final design_wireframes
Ubiquity final design_wireframes
 
Em13c New Features- Two of Two
Em13c New Features- Two of TwoEm13c New Features- Two of Two
Em13c New Features- Two of Two
 
6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
 
Version Uncontrolled - How to Manage Your Version Control (whitepaper)
Version Uncontrolled - How to Manage Your Version Control (whitepaper)Version Uncontrolled - How to Manage Your Version Control (whitepaper)
Version Uncontrolled - How to Manage Your Version Control (whitepaper)
 
6 Elements_Permissions.pdf
6 Elements_Permissions.pdf6 Elements_Permissions.pdf
6 Elements_Permissions.pdf
 
Customising Oracle's eBusiness Suite
Customising Oracle's eBusiness SuiteCustomising Oracle's eBusiness Suite
Customising Oracle's eBusiness Suite
 

Más de Billy Cripe

The Rise of the Free Agent Workforce
The Rise of the Free Agent WorkforceThe Rise of the Free Agent Workforce
The Rise of the Free Agent WorkforceBilly Cripe
 
Telling Your Story To A Disrupting Marketplace
Telling Your Story To A Disrupting MarketplaceTelling Your Story To A Disrupting Marketplace
Telling Your Story To A Disrupting MarketplaceBilly Cripe
 
Exchange Litigation Readiness with Digitiliti
Exchange Litigation Readiness with DigitilitiExchange Litigation Readiness with Digitiliti
Exchange Litigation Readiness with DigitilitiBilly Cripe
 
Christiania Parent Circle - Understanding How Kids Communicate social media
Christiania Parent Circle - Understanding How Kids Communicate social mediaChristiania Parent Circle - Understanding How Kids Communicate social media
Christiania Parent Circle - Understanding How Kids Communicate social mediaBilly Cripe
 
Can Your Desktop Backup Do This?
Can Your Desktop Backup Do This?Can Your Desktop Backup Do This?
Can Your Desktop Backup Do This?Billy Cripe
 
QR Codes: Hyperlinks for Meatspace
QR Codes: Hyperlinks for MeatspaceQR Codes: Hyperlinks for Meatspace
QR Codes: Hyperlinks for MeatspaceBilly Cripe
 
2 Types of Collaboration
2 Types of Collaboration2 Types of Collaboration
2 Types of CollaborationBilly Cripe
 
BloomThink - The Social Media Shift - Tech Talk
BloomThink - The Social Media Shift - Tech TalkBloomThink - The Social Media Shift - Tech Talk
BloomThink - The Social Media Shift - Tech TalkBilly Cripe
 
Even More Story Starters
Even More Story StartersEven More Story Starters
Even More Story StartersBilly Cripe
 
More Story Starters
More Story StartersMore Story Starters
More Story StartersBilly Cripe
 
Wish You Were Here! Social Consumer Engagement in the Cruise Industry
Wish You Were Here!  Social Consumer Engagement in the Cruise IndustryWish You Were Here!  Social Consumer Engagement in the Cruise Industry
Wish You Were Here! Social Consumer Engagement in the Cruise IndustryBilly Cripe
 
Should I Go Mobile? Am I Cool Enough?
Should I Go Mobile?  Am I Cool Enough?Should I Go Mobile?  Am I Cool Enough?
Should I Go Mobile? Am I Cool Enough?Billy Cripe
 
A Maven's Guide To ECM Best Practices
A Maven's Guide To ECM Best PracticesA Maven's Guide To ECM Best Practices
A Maven's Guide To ECM Best PracticesBilly Cripe
 
Mobility in the Enterprise
Mobility in the EnterpriseMobility in the Enterprise
Mobility in the EnterpriseBilly Cripe
 
Digital Archiving with Fishbowl Solutions
Digital Archiving with Fishbowl SolutionsDigital Archiving with Fishbowl Solutions
Digital Archiving with Fishbowl SolutionsBilly Cripe
 
Fishbowl Solutions' Oracle ECM 11g Upgrade, Migration & Solutions
Fishbowl Solutions' Oracle ECM 11g Upgrade,  Migration & SolutionsFishbowl Solutions' Oracle ECM 11g Upgrade,  Migration & Solutions
Fishbowl Solutions' Oracle ECM 11g Upgrade, Migration & SolutionsBilly Cripe
 
Information architecture for men in kilts slideshare
Information architecture for men in kilts slideshareInformation architecture for men in kilts slideshare
Information architecture for men in kilts slideshareBilly Cripe
 
If e20 is the shiznit why are we still using email slide share
If e20 is the shiznit why are we still using email slide shareIf e20 is the shiznit why are we still using email slide share
If e20 is the shiznit why are we still using email slide shareBilly Cripe
 
Collaborate2010 buzz fishbowl_solutions
Collaborate2010 buzz fishbowl_solutionsCollaborate2010 buzz fishbowl_solutions
Collaborate2010 buzz fishbowl_solutionsBilly Cripe
 

Más de Billy Cripe (20)

The Rise of the Free Agent Workforce
The Rise of the Free Agent WorkforceThe Rise of the Free Agent Workforce
The Rise of the Free Agent Workforce
 
Telling Your Story To A Disrupting Marketplace
Telling Your Story To A Disrupting MarketplaceTelling Your Story To A Disrupting Marketplace
Telling Your Story To A Disrupting Marketplace
 
Exchange Litigation Readiness with Digitiliti
Exchange Litigation Readiness with DigitilitiExchange Litigation Readiness with Digitiliti
Exchange Litigation Readiness with Digitiliti
 
Christiania Parent Circle - Understanding How Kids Communicate social media
Christiania Parent Circle - Understanding How Kids Communicate social mediaChristiania Parent Circle - Understanding How Kids Communicate social media
Christiania Parent Circle - Understanding How Kids Communicate social media
 
Can Your Desktop Backup Do This?
Can Your Desktop Backup Do This?Can Your Desktop Backup Do This?
Can Your Desktop Backup Do This?
 
QR Codes: Hyperlinks for Meatspace
QR Codes: Hyperlinks for MeatspaceQR Codes: Hyperlinks for Meatspace
QR Codes: Hyperlinks for Meatspace
 
2 Types of Collaboration
2 Types of Collaboration2 Types of Collaboration
2 Types of Collaboration
 
BloomThink - The Social Media Shift - Tech Talk
BloomThink - The Social Media Shift - Tech TalkBloomThink - The Social Media Shift - Tech Talk
BloomThink - The Social Media Shift - Tech Talk
 
Even More Story Starters
Even More Story StartersEven More Story Starters
Even More Story Starters
 
More Story Starters
More Story StartersMore Story Starters
More Story Starters
 
Wish You Were Here! Social Consumer Engagement in the Cruise Industry
Wish You Were Here!  Social Consumer Engagement in the Cruise IndustryWish You Were Here!  Social Consumer Engagement in the Cruise Industry
Wish You Were Here! Social Consumer Engagement in the Cruise Industry
 
Should I Go Mobile? Am I Cool Enough?
Should I Go Mobile?  Am I Cool Enough?Should I Go Mobile?  Am I Cool Enough?
Should I Go Mobile? Am I Cool Enough?
 
A Maven's Guide To ECM Best Practices
A Maven's Guide To ECM Best PracticesA Maven's Guide To ECM Best Practices
A Maven's Guide To ECM Best Practices
 
Mobility in the Enterprise
Mobility in the EnterpriseMobility in the Enterprise
Mobility in the Enterprise
 
Digital Archiving with Fishbowl Solutions
Digital Archiving with Fishbowl SolutionsDigital Archiving with Fishbowl Solutions
Digital Archiving with Fishbowl Solutions
 
Fishbowl Solutions' Oracle ECM 11g Upgrade, Migration & Solutions
Fishbowl Solutions' Oracle ECM 11g Upgrade,  Migration & SolutionsFishbowl Solutions' Oracle ECM 11g Upgrade,  Migration & Solutions
Fishbowl Solutions' Oracle ECM 11g Upgrade, Migration & Solutions
 
Story Starters
Story StartersStory Starters
Story Starters
 
Information architecture for men in kilts slideshare
Information architecture for men in kilts slideshareInformation architecture for men in kilts slideshare
Information architecture for men in kilts slideshare
 
If e20 is the shiznit why are we still using email slide share
If e20 is the shiznit why are we still using email slide shareIf e20 is the shiznit why are we still using email slide share
If e20 is the shiznit why are we still using email slide share
 
Collaborate2010 buzz fishbowl_solutions
Collaborate2010 buzz fishbowl_solutionsCollaborate2010 buzz fishbowl_solutions
Collaborate2010 buzz fishbowl_solutions
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Fishbowl Solutions LinkSecurity for Windchill 9.x

  • 1. Fishbowl SolutionslinkSecurityAchieving Pro/INTRALINK 3.x Folder Access Control under Windchill 9.x
  • 2.
  • 3. Gold Level Software Member of PTC Partner Advantage
  • 4. Customer Focused & Guaranteed Results!
  • 5.
  • 6. You’ll See… The access Control difference between Intralink 3.4 & Windchill How to reproduce Intralink 3.4 access control out-of-the-box in Windchill (hint: lots of clicks, headaches & indigestion) How Fishbowl Solutions’ linkSecurityautomates the access control administration process so you can stop popping the antacids.
  • 7. So, #1… What’s The Difference between Access Control In Intralink 3.4 and Windchill?
  • 8. Intralink 3.4 has a “rigid” access control structure implemented within a single interface
  • 9. Windchill has “flexible” access control configured in multiple interfaces & used in a variety of ways
  • 10. Windchill Access Control Challenges Objects do not simply inherit folder permissions in the expected manner Team roles apply to the entire context. This yields large numbers of Products and admin overhead in order to maintain the access control granularity desired by many companies. Ad Hoc policies have unexpected behaviors – they remain in effect after an object is promoted. Visibility is challenging - making them difficult to remove when done. Configuration is complicated due to multiple interfaces. The administrator must decide how the components work together.
  • 11. Components of Windchill Access Control Windchill Domains A Product/Library has a single “Default” domain OOTB The domain contains the access control rules Domains can be assigned to one or more specific folders Domains inherit access control rules of parent domains
  • 13. Components of Windchill Access Control Access Control Rules Each rule applies to a hierarchical object type Each rule can be applied to either a specific lifecycle state or across all lifecycles Each rule applies to a user, group, organization, or role Each rule contains permissions that either allow or deny operations such as Read, Create, Modify, Revise, etc…
  • 14. Rule Creation using the Policy Administrator Tool
  • 15. Components of Windchill Access Control Team Page Each Product/Library has a team page where users and groups are assigned to one or more roles The roles may be global or local to the specific Product/Library Note: Shared teams may be leveraged if you have common teams that apply across multiple Products or Libraries
  • 16. Components of Windchill Access Control Folder Properties Allows a folder to be assigned to a non-Default domain The preference: Security; Default Folder Domains; must be enabled to make this functionality available.
  • 17. Ok. #2. By now you’re probably asking yourself… “So how do I regain my Intralink 3.4 folder access control using these components?”
  • 18.
  • 19. Hierarchical structure must be mimicked to supply expected rights inheritance. Example: an individual who has rights to modify in the Interior folder would expect rights to modify in Dashboard folder as well. If Dashboard domain was not a child of Interior this would not happen.
  • 20.
  • 21.
  • 23.
  • 24. Complexity - The Policy Administrator tool can be complex for casual users to learn. Product and Library Managers need to be familiar it to be effective
  • 25.
  • 26. Fishbowl Solutions linkSecurity Folder Access Control Implemented within a single simplified user interface Never go into the Policy Administrator tool.
  • 27.
  • 29. linkSecurityautomates folder assignment and access control rule creation based on configurable rule sets.
  • 31. The familiar Team tool is still utilized to assign users and groups to folders. You get the benefit of automation without the learning curve.Features & Value Quality LinkSecurity insures that domains, teams, folders, and access control rules are correctly configured. Compatibility LinkSecurity automates the removal of domains and teams when folder access control is no longer desired on a particular folder.
  • 32. linkSecurityConclusions linkSecurityprovides a simplified user interface that allows a company to regain the folder access control that they were accustomed to in Intralink 3.4 linkSecurityhas been used to automate configuring folder access control on as many as 1,200 folders on a single system - with no performance degradation (validated using Fishbowl Solutions LinkTuner product.)
  • 33. Schedule a Demonstration with Us! mcadsales@fishbowlsolutions.com Fishbowl Solutions, Inc. www.fishbowlsolutions.com © 2010 Fishbowl Solutions 3601 Park Center Blvd, Suite 106 Minneapolis, MN 55416 TEL (952) 465-3400 • FAX (952) 465-3401