Server Security System
All of the resources (objects in the resource tree or version tables, such as folders, resources and archive versions) on Logi Report Server are protected by the Logi Report Server security system. This system is based on maintaining a registered set of users and setting permissions on each resource for each user.
The Logi Report Server runtime security checking system is implemented based on a standard set of Security Service method calls. The default implementation provided in Logi Report Server is based on the data set of users and resources that is stored in Logi Report Server.
For integration with an existing application that already has a system for managing users and permissions, Logi Report Server defines the Security Service as a Java interface and allows for an application developer to supply a customized version to replace the default implementation. This allows an existing application to provide a custom version of the Security Service that supports Logi Report Server runtime security checking based on user data and permissions that are stored outside of Logi Report Server. In this configuration, the Logi Report Server admin section for managing users and permissions is not used.
Logi Report Server also can integrate with an existing application that uses an LDAP system for managing user and group information. Logi Report Server can be configured to interact with the LDAP system so that edit of information about users and groups can be done only in the LDAP system. Information about permissions for resources is not part of the LDAP data model. That information continues to be maintained by Logi Report Server.
Accessing user and permission data by database lookup on each service request may result in many time-consuming IO operations. As a result, the performance of the server security system may be lowered. In order to promote performance, a cache system exists just above the Security Service. The cache system is used to store security objects including users, groups, roles and access control lists obtained from making calls to the Security Service. This cached data will be used when the same information is needed later.
The following is a diagram of the Logi Report Server security system structure:
This section contains the following topics about the server security system:
- Security System Data Model
- Multi-tenancy Supported via Organizations
- Role Based Security
- Security Cache System
- Using an LDAP Server's Security System
See also Customized Implementation of the Security API for details about using the Security API to build your preferred security system. For information about security in an integrated environment, see Seamless Integrated Security Solution.