IBM Enterprise Records, Version 5.1.+            

Configuring security marking propagation

For the PRO data model, which allows a parent object to inherit security marking settings from the child object, the System Administrator can configure the propagation of security markings. This configuration is set at the file plan level.

To use the propagation of security markings functionality, you must enable the SecurityPropagation event. For more information, see "Enabling and subscribing to events" in the IBM® Enterprise Records Installation and Upgrade Guide.

To configure security marking propagation:

  1. Log on to the IBM Enterprise Records application as records administrator.
  2. Select the Configure tab.
  3. Click System Configuration.
  4. The Configuration Items page displays. Select the value for Propagation Security Marking, as follows:
    • No Propagation Disables propagation from parent to child or child to parent. This is the recommended and default option.
    • Folder To Record Child entities inherit security markings from the parent entity.
    • Record To Folder Parent entity inherits security markings from the child entity if the child is given a more secure security marking.
    • Both Inheritance works in both directions.
  5. Click Apply to save the changes.
  6. Click Exit to cancel or close the Configuration Items page.


Feedback

Last updated: August 2011
configure_marking_propagation.htm

© Copyright IBM Corporation 2011.
This information center is powered by Eclipse technology. (http://www.eclipse.org)