The Security Constraints table identifies the constraints that are imposed on systems functionality due to some aspects of system design or implementation.


To create a Security Constraints table


  1. Click the Add New button. The new row is added.
  2. In the Applies To cell, click Editand  in the Select Subject Of Security Constraint dialog, choose the needed constrained element(s):
    • Asset
    • Asset Role
    • Exchange
    • Security Process
  3. Click OK.
  4. In the Rule Specification cell, click Editand in the Specification dialog, select the language and specify the body.

    The Rule Specification can be defined in English as well as using expressions or formulas (OCL).


To add an existing Security Constraint


  1. Click the Add Existing button. 
  2. In the Select Elements dialog, select Security Constraints. The filled row is added to the table.