Step1: designing a security schema, Step, Designing a security schema – Grass Valley Open SAN Security v.5.1 User Manual
Page 11

Digital News Production
9
Step
1
Designing a Security Schema
The first step in setting up security in your Open SAN system is to determine a
schema for permissions. The schema determines which groups you create, and
which permissions you give each group.
Thomson Grass Valley has created a typical schema for use in illustrating
security principles in this document. You may use this schema if it is
appropriate for your newsroom, or create your own. For the examples in this
manual, we’ll assume that the newsroom has five groups: Editors, Producers,
Archivists, Ingestors, and Viewers.
The Open SAN security principles are agnostic to these groups, though the use
of groups greatly simplifies the establishment of the security schema. We
picked these names as exemplary; you do not need to use them in your
operation. You can have as many or as few groups as you like, named however
you wish. If your domain has a tree hierarchy, you may assign permissions to
global groups as well.
The discussion in this chapter pertains to planning groups, users, and
permissions. The actual creation of domain entities and setting of permissions
are done in Step 8.