Security and Rulebases
You can optimize the implementation of security by checking against roles by evaluating the role list at the start of the rulebase and setting a flag.
Use the flag for better performance, instead of checking it against the roles.
For more efficiency and easier management, use decision tables for simple rules for access control and attribute visibility.
Copyright © Cloud Software Group, Inc. All rights reserved.