The main goal of security sources is to:
When a document is produced by a connector, the
Negative tokens can also be used to refuse credentials. In such case, negative rules are always prioritary, that is to say that if a positive token gives access to a document, and a negative one denies it, the access will be denied. By default, all security tokens are indexed in the product, to enable security features per document. Users also have a set of similar tokens associated with their authenticated accounts. These tokens are usually based on their access rights or group ownership. An authenticated user will only be able to find a document, if his set of security tokens contains at least an allowed token, and no negative token. Connectors and security sources work together, the tokens produced by the former are compared to the later to reduce the search results scope. For example: A filesystem source connector produces the following tokens (the
Any authenticated user whose token contains either
|