Security Inheritance Rule in Conceptual Objects
The security inheritance rule is applicable only to conceptual objects. When creating conceptual objects, you can specify how security is implemented based on a user's privileges. There are three security options for a conceptual object that are common to all three views of conceptual objects:
Root Based. Security is based on the user's security rights on the root object (top level object). Regardless of the entity type (constituent object) level, root privilege takes precedence.
Entity Based. Implements the security of each individual data object. In the root object (top level object) level, entity privilege takes precedence.
Conservative. This approach evaluates each entity level privilege and compares it with the root level privilege. The more conservative security of the two is implemented.
Root Level Privilege | Entity Privilege | Conservative Privilege |
View | Insert | View |
View | Edit | View |
Edit | View | View |
Edit | Insert | Edit |
Edit | Edit only certain columns | Edit only certain columns |
Edit only certain columns | Edit | Edit only certain columns |
Insert | View | View |
Insert | Edit | Edit |
No Delete | Delete | No Delete |
Delete | No Delete | No Delete |