Definition The Security Constraints (Sc-Ct) domain shows the security-related policy, guidance, laws and regulations as applicable to resources. It Specifies textual rules/non-functional requirements that are security constraints on resources, information and data (e.g. security-related in the form of rules (e.g. access control policy). A common way of representing access control policy is through the use of XACML (eXtensible Access Control Markup Language), it is expected that implementations of UAF allow users to link security constraints to external files represented in XACML. Implementation The Security Constraints (Sc-Ct) domain is represented by: Sample 
An example of the Security Constraints diagramConstraint owner You can choose where all the constraints will be stored through the Project Options. To select a constraint owner
- In the main menu, click Options > Project. The Project Options dialog opens.
- Go to General > UAF, and in the Default Constraint Owners property group, choose a needed owner.
|