Security Guide (PDF)

MarkLogic 9 Product Documentation
Security Guide
— Chapter 16

« Previous chapter
Next chapter »

Designing Security Policies

This chapter describes the general steps to follow when using security in an application. Because of the flexibility of the MarkLogic Server security model, there are different ways to implement similar security policies. These steps are simple guidelines; the actual steps you take depends on the security policies you need to implement. The following sections are included:

Research Your Security Requirements

As a first step in planning your security policies, try to have answers for the following types of questions:

  • What documents do you want to protect?
  • What code do you want to control the execution of?
  • Are there any natural categories you can define based on business function (for example, marketing, sales, engineering)?
  • What is the level of risk posed by your users? Are your applications used only by trusted, internal people or are they open to a wider audience?
  • How sensitive is the data you are protecting?

This list is not necessarily comprehensive, but is a good way to start thinking about your security policy.

Plan Roles and Privileges

Depending on your security requirements and the structure of your enterprise or organization, plan the roles and privileges that make the most sense.

  1. Determine the level of granularity with which you need to protect objects in the database.
  2. Determine how you want to group privileges together in roles.
  3. Create needed URI and execute privileges.
  4. Create roles.
  5. Create users.
  6. Assign users to roles.
  7. Set default permissions for users, either indirectly through roles or directly through the users.
  8. Protect code with xdmp:security-assert functions, where needed.
  9. Load your documents with the appropriate permissions. If needed, change the permissions of existing documents using the xdmp:document-add-permissions, xdmp:document-set-permissions, and xdmp:document-remove-permissions functions.
  10. Assign access privileges to HTTP, WebDAV, ODBC, and XDBC servers as needed.
« Previous chapter
Next chapter »
Powered by MarkLogic Server | Terms of Use | Privacy Policy