Definition

The Security Constraints (Sc-Ct) domain shows the security-related policy, guidance, laws and regulations as applicable to resources. It Specifies textual rules/non-functional requirements that are security constraints on resources, information and data (e.g. security-related in the form of rules (e.g. access control policy). A common way of representing access control policy is through the use of XACML (eXtensible Access Control Markup Language), it is expected that implementations of UAF allow users to link security constraints to external files represented in XACML.

Implementation

The Security Constraints (Sc-Ct) domain is represented by:

Sample

An example of the Security Constraints diagram

Constraint owner

You can choose where all the constraints will be stored through the Project Options.

To select a constraint owner


  1. In the main menu, click Options > Project. The Project Options dialog opens.
  2. Go to General > UAF, and in the Default Constraint Owners property group, choose a needed owner.