Open topic with navigation
You can use IDOL mapped security with Fact Bank, by including the ACL information in your SQL backend fact store.
To use IDOL mapped security with Fact Bank you must:
sourcestable in your SQL database fact store, with the ACL values.
security_typestable in your SQL database fact store, with the details of the security types.
Security configuration in Answer Server is similar to the configuration in the IDOL Content component. Depending on your data sources, it is likely that your Answer Server security configuration contains the same security types as your IDOL Content component data store.
You do not need any additional security libraries to run security in Answer Server fact bank.
To configure security in Answer Server
[Security] configuration section, or add one if it does not exist.
[Security] section, set the
SecurityInfoKeys parameter to specify the security encryption keys to use to encrypt and decrypt the security information. You can set the
SecurityInfoKeys parameter either to the name of an AES key file (recommended) or to a comma-separated list of four signed 32-bit integers. For information about how to generate a key file with the
autpassword command-line tool, refer to the IDOL Server Administration Guide.
[Security] section, list the security types that you want to use.
0=NT 1=Netware 2=Notes 3=Exchange
Create a section for each of the security types you defined (the section must have the same name as the security type). For each section, provide settings that determine how Answer Server handles that security type. For example:
[NT] Type=AUTONOMY_SECURITY_V4_NT_MAPPED [Netware] Type=AUTONOMY_SECURITY_NETWARE_MAPPED [Notes] Type=AUTONOMY_SECURITY_V4_NOTES_MAPPED [Exchange] Type=AUTONOMY_SECURITY_EXCHANGE_MAPPED
To use mapped security with your facts, you must use the
sources table in your SQL fact store.
The sources table contains details of the source for your facts. Each source has an ID, which you use in the facts table to identify the source for an individual fact. For example:
When you use mapped security, the sources table also includes an access control list (ACL) for each source, and a security type ID. The security type ID corresponds to a row in the
security_types table, which contains details of your configured security types.
For more information about the tables in your SQL fact store, see Set Up a SQL Backend as Fact Store.