How Document Security Works

Document security is implemented by indexing a document's Access Control List (ACL) and generating security tokens when the user authenticates.

If your network already has a security policy in place, you may want to reuse it for authentication in Exalead CloudView.

Note: In Exalead CloudView, password, and login management is centralized and changes are automatically propagated.
Configure a security source to authenticate users and authorize their document access.

The document security workflow is described below.



Step

Description

1

The user logs in to the Exalead CloudView search application.

2

Exalead CloudView queries a security source for:

  • Authentication: to verify the user's login and password
  • Authorization: to verify the security tokens for the user and the group to which the user belongs

3

The user enters his search query.

4

The user's query and security tokens are sent to the index.

The index only fetches documents that match both the user's query and the user's security tokens.