beautypg.com

Designing a security schema, Sample security schema – Grass Valley Aurora Edit LD v.6.5 Installation User Manual

Page 72

background image

58

Aurora Edit Installation Guide

November 25, 2008

Chapter 1 Aurora Edit Security

Designing a security schema

In order to set up security in your SAN system you need create a schema for permissions.

The schema determines which groups you create, and which permissions you give each

group.
Thomson Grass Valley has created a typical schema for use in illustrating security

principles in this document. You may use this schema if it is appropriate for your

newsroom, or create your own. For the examples in this manual, we’ll assume that the

newsroom has five groups: Editors, Producers, Archivists, Ingestors, and Viewers.
The SAN security principles are agnostic to these groups, though the use of groups

greatly simplifies the establishment of the security schema. We picked these names as

exemplary; you do not need to use them in your operation. You can have as many or as

few groups as you like, named however you wish. If your domain has a tree hierarchy,

you may assign permissions to global groups as well.

Sample security schema

The following table lists the groups and permissions being used as an example in this

document:

News Group

Bin

Permissions

Domain Administrator

All

Full control

Editors

Monday-Sunday

Read/Write/Delete in top level bins, but cannot
delete material from newscast bins.

Feeds

Read only

HFR

Read/Write

Archive

Read/Write

Producers

Monday-Sunday

Read/Write

Feeds

Read only

HFR

Full control

Archive

Read/Write

Archivists

Monday-Sunday

Read only

Feeds

Read/Write

HFR

Read only

Archive

Full control

Ingestors

Monday-Sunday

Read only

Feeds

Full control

HFR

None (permission denied)

Archive

Read/Write

This manual is related to the following products: