Add Artifact permissions control for service invocation to security model
Showing
1 changed file
with
1 additions
and
0 deletions
| ... | @@ -50,6 +50,7 @@ Foundation for autonomous business operations (ECA/SECA systems). | ... | @@ -50,6 +50,7 @@ Foundation for autonomous business operations (ECA/SECA systems). |
| 50 | ### **Security Model** | 50 | ### **Security Model** |
| 51 | - **Complete Discovery**: See all screens that exist in the system | 51 | - **Complete Discovery**: See all screens that exist in the system |
| 52 | - **User Enforcement**: Access limited to user's actual permissions | 52 | - **User Enforcement**: Access limited to user's actual permissions |
| 53 | - **Service Control**: All service invocation strictly controlled by Artifact permissions | ||
| 53 | - **Audit Safe**: All actions logged and traceable to real users | 54 | - **Audit Safe**: All actions logged and traceable to real users |
| 54 | - **Container Isolation**: Run in Docker/Kubernetes with separate databases | 55 | - **Container Isolation**: Run in Docker/Kubernetes with separate databases |
| 55 | 56 | ... | ... |
-
Please register or sign in to post a comment