- 16 Feb 2024
- 4 Minutes to read
- Print
- DarkLight
Security Collections
- Updated on 16 Feb 2024
- 4 Minutes to read
- Print
- DarkLight
The Search Appliance allows for the creation of security collections of data that are used to limit the information a user has access to. Security collections are query-based and allow the inclusion or exclusion of selected records in search results for groups. Often collections use sets for these purposes. After a collection is created, the users in that group do not have access to any additional information unless additional permissions are granted.
Security collections are additive. This means that if a user is made part of a collection and then added to another, the user has access to information from both even if one of them is more restrictive than the other.
Creating or Verifying Prerequisites
Some preliminary steps are needed in order to create collections:
- Verify or create all users necessary for the collection. Make sure users are not assigned to extra groups that give them greater access than desired.
- Verify or create the group. Any user that should have limited access must be assigned to a group; however, the group may consist of one user.
- Create a set definition if needed. Remember that the data within sets is unchanging and must be updated in order for new records to be included.
Creating a Security Collection
- In the navigation pane, click Security Collections.
- Click .
- Type the Name of the collection. Spaces are not supported and cannot be used in collection names. Use camel case or underscores to help distinguish words if needed: CamelotKnights or knights_of_camelot.
- Type the Description of the collection.
- Choose the Access Type:
- Full data access gives the users access to all data on the server.
- Query-based access gives user access only to the data found within the query entered. Any query the users run uses data found within the query entered here to get results. See below for more information on entering the query.
- Assign the collection to the desired group or groups.
- Click by the group name to add an individual group.
- Click to add all groups at one time.
- Click
Clicking
returns you to the list of collections without saving the changes.Editing a Security Collection
After clicking on the desired collection, click on the section you'd like to edit when the details panel on the right opens.
- Locate and click the collection.
- Edit the Description by clicking .
- Edit the Data Access by clicking below for more information on entering the query. . See
- Reassign the collection to the desired group or groups by clicking Manage Groups. Move the groups to the proper columns:
- Click by the group name to add an individual group.
- Click to add all groups at one time.
- Click by the group name to remove an individual group.
- Click to remove all groups at one time.
- Click Reset to return all groups to their original position.
- Click Save.
Entering the Query
The accessible data for each collection is determined by a query. Use Boolean syntax to properly write the query that contains all necessary terms. IMAT suggests first writing and running the query in the single query builder to verify that you are getting the expected results and that the query is written correctly. After you are satisfied that it is correct, copy the query to Security Collections.
Some common query examples are found below for set definitions and facilities.
These are examples of collections using NREF collections with or without sets:
- ()s.sending_facility:"Camelot Physicians"
- ()SET:__myset__
These are examples for collections using PatientIDN collections. Notice the use of FILTER is required with PatientIDN.
- ()FILTER(PatientIDN:SET:__myset__)
- ()s.sending_facility:"123 Pediatrics" FILTER(PatientIDN:SET:__ABC_Pediatrics__)
You may choose to enter NOT as part of the query to exclude specific data:
- ()SET:__myset__ NOT (SET:__mySubset__)
Keep in mind that if you use sets, the information in the set does not change until the set has been updated through Set Definitions.
Viewing Security Collection Details
The security collection screen displays a table of the collection details: the name, provider, description, how many groups are assigned, and if the data allows access to all information or if it is limited. A check appears in the Full Access column (hidden by the open details panel in the image to the left) if no query has been entered.
Clicking on a collection opens a panel to the right. This displays the same information with the addition of the query. It also allows access to the edit and delete buttons.
Understanding Default Security Collections
The server comes with two preconfigured security collections: public and system. Public is a read-only collection and the settings are established when setting up the server. In most cases, it should have closed access; if it has full access, than no security is present. The system collection gives all searchappliance_system users access to all data.
Deleting a Security Collection
- In the navigation pane, click Security Collections.
- Locate and click the collection.
- Click .
- Confirm you would like to delete the collection.