Business Data Catalog: Security Model
This section contains overviews of the Business Data Catalog authentication and authorization models.
In this section
- Business Data Catalog Authentication
Describes the two authentication patterns you can use to authenticate Business Data Catalog users: Trusted Subsystem, and Impersonation and Delegation.
- Business Data Catalog Authorization
Explains the two authorization patterns you can use to control user access to data managed by the Business Data Catalog: back-end authorization and middle-tier authorization.