GRASS VALLEY Aurora Edit Security Скачать руководство пользователя страница 2

1

AurorA Edit SEcurity

www.grassvalley.com

With Aurora

 edit Security from Grass Valley

, you can control the visibility and access for users and groups working within Aurora 

edit bins by controlling the file system permissions for the bins and assets. Aurora edit Security uses the overlapping modes of 
inheritance, exclusivity, and group membership as implemented by Windows Active Directory (AD) to establish and enforce asset 
security. these principles apply:

Selective access.

• 

 You create groups of users, such as editors, producers, and interns, and set permissions for each group.

Partial control.

• 

 You control access to subbranches of the bin tree for users and groups.

Administrative control.

• 

 the administrator has exclusive access to a tool in the top-level bin that allows the setting of 

permissions on the bin-tree root. At all levels of bins (as a feature of Active Directory), you control who can control access.

As part of its open architecture, the Aurora suite of products stores media on Windows-compatible file system volumes, notably 
the Grass Valley K2 Summit

 shared storage system. these volumes support Windows Active Directory; thus, Aurora edit is able to 

leverage Active Directory, particularly in a large, multi-user, domain-controlled environment, to effect fine-grained access control of 
the Aurora edit assets, including master clips, subclips, sequences, graphics, and bins. (Subclips and sequences are controlled by 
their containing bins.) Aurora edit security is essentially the application of Active Directory controls to Aurora edit assets.

Introduction

Technical Background

Example

As an elementary example, suppose that your organization has 
the bins and groups shown in the table below. the day-named 
and investigative bins are sub-bins of the top-level Work in 
progress bin. 

Read, Write, and Delete permissions are abbreviated to R, W, 
and D. permissions are set on top-level bins and are allowed to 
automatically flow by inheritance (indicated by parentheses) to 
descendent bins. (Active Directory permissions and inheri-
tances are in fact more nuanced, but they can be effectively 
discussed as RWD.)

not listed here are several user members in the groups. in par-
ticular, Bob (a member of group editors) and Alice (a member 
of group producers) are working exclusively on a secret inves-
tigative report. on the investigative bin, inheritance is blocked 
such that no user automatically has access to the bin; permis-
sion must be explicitly granted, and it is only for Bob and Alice, 
who both enjoy full RWD privilege. note that in other bins, 
Bob’s and Alice’s permissions are automatically established by 
their group membership, such that permissions for these (or 
any other) individual users need not be explicitly set.

Содержание Aurora Edit Security

Страница 1: ...ibility and access Patrick Thompson Senior Software Engineer January 2011 Using the Aurora Edit Security feature you can control which users and groups have which permissions read write delete etc on which assets in the Aurora Edit bin tree www grassvalley com ...

Страница 2: ...to effect fine grained access control of the Aurora Edit assets including master clips subclips sequences graphics and bins Subclips and sequences are controlled by their containing bins Aurora Edit security is essentially the application of Active Directory controls to Aurora Edit assets Introduction Technical Background Example As an elementary example suppose that your organization has the bins...

Страница 3: ...ample are not imposed by Aurora Edit these entities are chosen by the user Active Directory and in turn Aurora Edit support whatever schema your organization requires Security in action In the screen capture below user Joe Intern a member of the Interns group has attempted to delete a sub clip within the Monday bin and been denied permission Example cont Bin Group Permissions User Permissions Edit...

Страница 4: ...in the file system As an alternative to setting permissions with Aurora Edit you can set permissions directly on the associated folders using for example Windows Explorer or any administrative application Typically during configuration organizations establish an inheritance and group hierarchy for assets and users such that permissions do not require constant management the desired access control ...

Страница 5: ...ecurity disabled With simple changes to two configuration files and a system wide reboot the system will reawaken ready to support permissions Note This is not a destructive change existing assets are preserved Set permissions on the file system according to your schema This can be done efficiently by exploiting the features of groups and of inheritance The setting can be executed on Aurora Edit o...

Отзывы: