The Security Constraints table identifies the constraints that are imposed on systems functionality due to some aspects of system design or implementation.
To create a Security Constraints table
In the Rule Specification cell, click the Specification dialog, select the language and specify the body.
The Rule Specification can be defined in English as well as using expressions or formulas (OCL). |
To add an existing Security Constraint
There is a predefined report for the Security Constraints table.
To generate the report