<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Metadata permissions in Administration and Deployment</title>
    <link>https://communities.sas.com/t5/Administration-and-Deployment/Metadata-permissions/m-p/544956#M15932</link>
    <description>&lt;P&gt;I've discovered a flaw in the access control model we have for our metadata.&lt;/P&gt;
&lt;P&gt;We have a large number of libraries saved (mostly) in their own metadata folders within /Shared Data, and ACTs are applied to those locations to ensure that only authorised users may view/update data within them.&amp;nbsp;Up to a year ago this worked fine because nobody explicitly used metadata folders, simply&amp;nbsp;saving and querying&amp;nbsp;data sets within metadata-defined libraries.&amp;nbsp;However, we got a new&amp;nbsp;SAS infrastructure&amp;nbsp;last year, which included Visual Analytics. As a result, users are&amp;nbsp;explicitly&amp;nbsp;creating VA reports within metadata folders.&amp;nbsp;&amp;nbsp;I've now realised that the permissions on /Shared Data itself&amp;nbsp;are inherited from the Default ACT, which grants SASUSERS RM,WM,WMM and CM. This means that any user may save their reports directly into /Shared Data. The easiest way to stop this would be to remove the WM grant from the Default ACT but I don't know if this would have any unexpected and undesirable consequences.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone have any thoughts on this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks.&lt;/P&gt;</description>
    <pubDate>Thu, 21 Mar 2019 17:09:01 GMT</pubDate>
    <dc:creator>Nigel_Pain</dc:creator>
    <dc:date>2019-03-21T17:09:01Z</dc:date>
    <item>
      <title>Metadata permissions</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Metadata-permissions/m-p/544956#M15932</link>
      <description>&lt;P&gt;I've discovered a flaw in the access control model we have for our metadata.&lt;/P&gt;
&lt;P&gt;We have a large number of libraries saved (mostly) in their own metadata folders within /Shared Data, and ACTs are applied to those locations to ensure that only authorised users may view/update data within them.&amp;nbsp;Up to a year ago this worked fine because nobody explicitly used metadata folders, simply&amp;nbsp;saving and querying&amp;nbsp;data sets within metadata-defined libraries.&amp;nbsp;However, we got a new&amp;nbsp;SAS infrastructure&amp;nbsp;last year, which included Visual Analytics. As a result, users are&amp;nbsp;explicitly&amp;nbsp;creating VA reports within metadata folders.&amp;nbsp;&amp;nbsp;I've now realised that the permissions on /Shared Data itself&amp;nbsp;are inherited from the Default ACT, which grants SASUSERS RM,WM,WMM and CM. This means that any user may save their reports directly into /Shared Data. The easiest way to stop this would be to remove the WM grant from the Default ACT but I don't know if this would have any unexpected and undesirable consequences.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone have any thoughts on this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 17:09:01 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Metadata-permissions/m-p/544956#M15932</guid>
      <dc:creator>Nigel_Pain</dc:creator>
      <dc:date>2019-03-21T17:09:01Z</dc:date>
    </item>
    <item>
      <title>Re: Metadata permissions</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Metadata-permissions/m-p/545083#M15937</link>
      <description>&lt;P&gt;I normally create my own top folder(s) with depending on the use case either the name of the company/high level functional area or the project/solution.&lt;/P&gt;
&lt;P&gt;Would it still be an option for you to reorganize your metadata in such a manner or would that already impact to heavily on existing VA reports?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 22:30:01 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Metadata-permissions/m-p/545083#M15937</guid>
      <dc:creator>Patrick</dc:creator>
      <dc:date>2019-03-21T22:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: Metadata permissions</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Metadata-permissions/m-p/545164#M15944</link>
      <description>&lt;P&gt;It would be a nice idea but potentially disruptive.&amp;nbsp;Although actual VA usage isn't very large at the moment,&amp;nbsp;there are around 230 folders,&amp;nbsp;with contents,&amp;nbsp;which I would have to move to a new top-level folder. And I would presumably have to modify the VA.Default.MetadataFolder value manually in the extended attributes of all the LASR libraries?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Alternatively, would there be any dangers to assigning a new ACT to the /Shared Data folder denying&amp;nbsp;the write permissions to SASUSERS?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 09:51:26 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Metadata-permissions/m-p/545164#M15944</guid>
      <dc:creator>Nigel_Pain</dc:creator>
      <dc:date>2019-03-22T09:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: Metadata permissions</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Metadata-permissions/m-p/545177#M15945</link>
      <description>&lt;P&gt;Hi Nigel,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i would advise against removing the SASUSERS: +WM from the repository ACT (commonly Default ACT). From memory I believe that those broad grants of +RM and +WM to SASUSERS at the repository level control the ability to log in and create new objects (which all SAS users need to do) - I can't find any explicit documentation on this so I'll double check and test it when I get a chance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you look at the &lt;A href="https://documentation.sas.com/?docsetId=mcsecug&amp;amp;docsetTarget=p1l940mm84jcsan17pqzj5m64ex4.htm&amp;amp;docsetVersion=9.4&amp;amp;locale=en" target="_self"&gt;Adjust the Repository-Level Settings&lt;/A&gt; section in the &lt;EM&gt;SAS 9.4 Management Console: Guide to Users and Permissions&lt;/EM&gt;, it states "&lt;EM&gt;All users need ReadMetadata and WriteMetadata access at the repository level. In general, it is appropriate for the SASUSERS group to have these permissions on the repository ACT's Permission Pattern tab.&lt;/EM&gt;"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I would recommend instead is that you use something like a "Hide ACT" to revoke WM from all users except admins and selectively grant WM (or WMM) back to those that require it with additional ACTs. For more info on this see the &lt;A href="https://documentation.sas.com/?cdcId=bicdc&amp;amp;cdcVersion=9.4&amp;amp;docsetId=bisecag&amp;amp;docsetTarget=n185avzcthteban1fyel8anqt2t1.htm&amp;amp;locale=en" target="_self"&gt;Baseline ACTs&lt;/A&gt; section in the &lt;EM&gt;SAS 9.4 Intelligence Platform: Administration Security Administration Guide&lt;/EM&gt;. If you haven't already seem them, I would also wholeheartedly recommend reading&amp;nbsp;David Stern's excellent &lt;EM&gt;Five papers on Recommended SAS 9.4 Security Model Design&lt;/EM&gt; (&lt;A href="https://communities.sas.com/t5/SAS-Communities-Library/Five-papers-on-Recommended-SAS-9-4-Security-Model-Design-part-1/ta-p/361569" target="_self"&gt;part 1&lt;/A&gt; &amp;amp; &lt;A href="https://communities.sas.com/t5/SAS-Communities-Library/Five-papers-on-Recommended-SAS-9-4-Security-Model-Design-part-2/ta-p/361575" target="_self"&gt;part 2&lt;/A&gt;).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I hope this is useful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers&lt;BR /&gt;Paul&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 11:01:17 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Metadata-permissions/m-p/545177#M15945</guid>
      <dc:creator>PaulHomes</dc:creator>
      <dc:date>2019-03-22T11:01:17Z</dc:date>
    </item>
    <item>
      <title>Re: Metadata permissions</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Metadata-permissions/m-p/545720#M15949</link>
      <description>&lt;P&gt;Thank you Paul, that answers my question, and confirms my worries about modifying the Default ACT. I'll apply an extra ACT to /Shared Data, denying WM and WMM to SASUSERS. By far the easiest and safest option, too.&lt;/P&gt;
&lt;P&gt;Thanks also for the recommendation on David's papers. He worked with&amp;nbsp;us to set up our metadata security model (and migrate the&amp;nbsp;metadata from 9.1.3) when we moved to 9.3 some years back. Top man!&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2019 10:07:45 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Metadata-permissions/m-p/545720#M15949</guid>
      <dc:creator>Nigel_Pain</dc:creator>
      <dc:date>2019-03-25T10:07:45Z</dc:date>
    </item>
    <item>
      <title>Re: Metadata permissions</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Metadata-permissions/m-p/545993#M15957</link>
      <description>&lt;P&gt;No worries Nigel. Good to hear it helped. Thanks for marking the post solved too.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2019 23:31:43 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Metadata-permissions/m-p/545993#M15957</guid>
      <dc:creator>PaulHomes</dc:creator>
      <dc:date>2019-03-25T23:31:43Z</dc:date>
    </item>
  </channel>
</rss>

