On this page
Creating a diagram
To create a Security Constraints Definition diagram
- In the Containment Tree, select the Security Constraints package and do one of the following:
- From the selected package's shortcut menu, select Create Diagram > Security Constraints Definition.
- In the modeling tool's main menu, click Create Diagram, search for Security Constraints Definition and select it.
- From the selected package's shortcut menu, select Create Diagram > Security Constraints Definition.
- Name a diagram or leave it with the default name.
Creating an element
When the diagram is created, you can start creating the appropriate elements (assets). An example is described using the Security Enclave element, but the same is valid for other assets.
To create an element in a diagram
- In the diagram palette, click the Security Enclave (or another appropriate element) and then click the appropriate place on the diagram pane.
- Name the element.
To create an element in the Containment tree
- Right-click the Security Taxonomy package and from the shortcut menu, select Create Element. Search for the Security Enclave (or another appropriate element) and select it.
- Name the element.
- Drag the created element from the Containment tree to the diagram pane.
To create the elements from other resources (e.g. Word, Excel, HTML)
- Copy a list in your resource.
- In a diagram, press Ctrl+V and from the Paste Special dialog, choose Element.
- From the Select Type dialog, choose Security Enclave (or another appropriate element).
Creating Resource Exchanges in Security Constraints Definition diagram
To create a Resource Exchange
- Open the Realized Resource Exchange wizard by doing one of the following:
- On the diagram pane, select the asset (e.g. Security Enclave) and from its smart manipulator toolbar, select and then click another asset to connect them.
- Click and on the diagram palette, and connect the assets.
Specify the Exchange Name, Resource Exchange Type.
- Select the Exchange Kind from one of the following:
Geo Political Extent Exchange
- Resource Communication
- Resource Energy Flow
- Resource Movement
- Click Next to specify Producing and Consuming Functions.
- Click Finish when you are done.
Creating and applying Security Constraints
- Select a needed asset and open its Specification window.
- In the Constraints property group, click Create > Security > Security Constraint.
- Specify the name.
In the Specification cell, define the rule.
The specification (rule) can be defined in English as well as using expressions or formulas (OCL).
o one of the following
- In the Containment tree, select a Security Constraint and drag it on the element.
- In the needed element's Specification window, go to Constraints property group. Click the Apply button and from the Select Element window, choose a constraint.