...
Naming Conventions
The following naming conventions are proposed convention has been defined for Custom Security Attributes to ensure that attributes and attribute sets can be re-used.:
- The name of each attribute and associated attribute set will include the tenant name followed by the static Csa identifier followed by the data type and a sequential numeric identifier within the set of attributes that are of the same data type.
- Ex. utexasCsaString1, utexasCsaInteger2, utexasCsaBoolean3
Attribute Map
The following page contains the details of the custom security attributes assignments:
...