So far in this book we have been changing our sample master data as we wish, adding and deleting members to complete the various exercises. In contrast, in a production environment, controls need to be in place to ensure that master data is only changed by authorized users.
As we will see in this final chapter, Master Data Services contains a variety of security features to address these issues. We will cover each security feature, extending our sample model as we go.
In this chapter, we will cover the following topics:
Master Data Services security overview
Users and Group Administration
User and Group Permissions