Fear seems to be a big part of the engineering-on-the-cloud discussion, at least in the blogosphere and on discussion boards. But I think there are two different fears that need to be addressed. The first fear, the fear of losing your intellectual property, can be overcome and it is what I would call an “unhealthy” fear. The second, the fear of falling behind, is trickier but I would argue that it is a “healthy” fear because worrying about it can make you stronger and ultimately help you. So read on to see if either of these fears resonates with you. Continue Reading
There are cases when you will want unauthenticated users to be able to access a SharePoint site. The most common reason is when you are using SharePoint for your public-facing Web site. Windows SharePoint Services (WSS) supports this functionality. To configure anonymous access to WSS, follow these steps: Continue Reading
Anyone who works with SolidWorks Enterprise PDM (EPDM) knows that there are multiple factors that play a role in user permissions. Sometimes it can be difficult to determine the kind of permission to apply to achieve a desired result or to find the setting that is causing an undesired behavior. So let’s dig in to the EPDM security model and take a look at the different criteria that EPDM uses to provide access to files. Continue Reading
SmarTeam “workflow security” and “workflow sharing” settings can provide powerful capabilities or cause serious headaches related to object-level security. By preventing users outside of the workflow from accessing objects active in the workflow process, or by preventing objects from participating in more than one workflow at a time, these features can do a lot to enforce the usage of workflow and adherence to corporate processes. Continue Reading
The EPDM Security model for folders is similar, but not identical to folder security in Microsoft Windows. Folder access does have the standard read/write permissions as well as a laundry list of granular check boxes that help the EPDM Administrator control visibility and change access to the files inside a folder and even changes made to the folder itself.
If you don’t trust your users, you lock down your user interface, or even just provide a user-specific interface, using DriveWorks. There may be cases when you want to control navigation (which forms users can see), data entry (which fields are visible and enabled), or maybe even other aspects of your implementation.
Here’s how Razorleaf has implemented this functionality for some of its clients. Continue Reading
Security is important in PLM systems because of the nature of the records they maintain. By keeping the recipes for valuable products and product elements, PLM can house the fundamental source of a business’ revenue. Naturally, every business wants to keep its “secret sauce” safe and protected from prying eyes. In some cases, the security isn’t necessarily just to keep people out, but to simplify data sharing and reduce information overload. In any event, PLM objects need to be secured, and authorizations selectively applied to allow controlled access to product records. Continue Reading