Security Model
Role-based access control
User roles determine:
- Visibility of objects
- Validation permissions
- Administrative capabilities
Scoping
Business groups restrict:
- Geographic scope
- Thematic scope
- Object group scope
Data integrity
- All validation actions are logged
- No direct modification of reference schema without workflow