Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Naming Conventions

The following naming conventions are proposed convention has been defined for Custom Security Attributes to ensure that attributes and attribute sets can be re-used.:

  • The name of each attribute and associated attribute set will include the tenant name followed by the static Csa identifier followed by the data type and a sequential numeric identifier within the set of attributes that are of the same data type.
    • Ex. utexasCsaString1, utexasCsaInteger2, utexasCsaBoolean3

Attribute Map

The following page contains the details of the custom security attributes assignments:

...